Know what is a cyber crime and its types and stay safe

What is cybercrime

Cybercrime is an illegal act, which is carried out with the help of the internet or digital means. In general terms, crimes committed through the internet or any network and computer come under the category of cybercrime. We use the internet in our daily lives through our laptops, mobiles and tablets for things like research, financial transactions, education, job search, online booking, business, shopping, blogging and entertainment. This internet has given many facilities but many types of new crimes also get opportunity to grow through internet.

Types of cybercrime

Cyber ​​Stalking

This type of crime is mainly committed through social media Facebook, Instagram, email sites etc. Under this, criminals harass people who are either small children or teenagers. They indecently chat with them or even send them obscene pictures. In such a situation, due to a lack of understanding and information in children, they become victims and the criminal keeps harassing them again and again from different IDs and blackmails them.

Cyber ​​Bullying

Different types of cases are seen under cyberbullying. Criminal boys make friends with girls from different places through social media and after gradually increasing the interaction, insist on having a relationship with them and finally convince them. Criminals take obscene photos and videos of them, after which they start blackmailing them. Apart from this, they threaten them that they can upload their photos and videos on social media. In such a situation, the victim gets scared and takes some wrong steps, this is called cyberbullying.

Cyber ​​spying

Under cyber spying, some cameras are quietly installed in the bathrooms and bedrooms of some big hotels. Some obscene photos and videos of those girls are recorded in those cameras. Something similar is done in shopping malls or some garment shops, where girls change their dresses and check their fittings. Those girls are blackmailed by taking pictures and videos, which is a punishable cybercrime of high degree.

Cyber ​​Pornography

Under this, internet pornography and pornographic websites are included. Under this, broadcasting of pornographic materials like sending obscene photos/videos, writing and uploading/downloading obscene literature etc. are included. It includes crimes like Online sexual extortion, Honey Traps, Morphing Pic, Deep Fake etc.

Hacking

When a person for some purpose, through technology or software, modifies the system in your computer, network server etc., steals or destroys data by modifying it, this process is called hacking. Hacking is the most common form of cybercrime in today’s time. Its purpose is usually to extort ransom, interfere with a person’s personal information without permission or achieve any illegal political objective.

Phishing

An unwanted activity through which a person of a criminal nature tries to trap computer internet users by sending them e-mails or SMS and tries to get their bank account, PIN password etc. by luring the internet users. If the criminal succeeds in his objective, he can withdraw money from the bank account of the said person and can also blackmail him.

Vishing

Vishing is a method of fraud in which fraudsters obtain your personal information over the phone and empty the money from your account. If you do not have complete information about Vishing, then fraudsters can take advantage of it and harm you. This information includes your details like bank user ID, Login ID, Transaction password, OTP, Unique registration number, card pin, grid card value, CVV, Date of birth etc.

Spamming

It means sending unwanted emails to a person’s e-mail account without his consent. To avoid this, some programs like Spamnet and Spam Filter have been created. However, stopping spamming completely is a complex task.

Password Cracking

Password Cracking/Crossing means taking control of the password of someone’s email or internet account by trying or stealing it repeatedly. To avoid this, a new technology Fingerprint Reader has been used recently, which does not allow anyone other than the real owner to enter the account.

Salami Techniques

Through this, cyber criminals insert an unwanted program in the computer system of the bank to withdraw money (usually a very small amount) from the accounts of bank account holders, which transfers some amount from the account holders’ account to the account of the said criminal.

Data Diddling

This is an activity through which the data is first changed before it is processed on the computer and then after the computer processing, the data is converted into its original form.

Spoofing

Fraudsters are using Email Spoofing, Call Spoofing and Web Spoofing to commit cybercrime. It can also be called cheating, because what happens under this is that to take revenge on a computer user or harass him, an email is sent or a call is made to the said person (who is to be harassed) from another person’s address.

Email Bombing

Email bombing means sending a large number of emails to the victim, which is a malicious act in which a large number of email messages are sent to the same email address in a short time. The purpose of an email bomb is usually to overflow the user’s inbox. In some cases, it will also make the mail server unresponsive.

Trojan/Virus Attack

A Trojan is an unauthorized program that gains control over another’s system. Malware/Virus is a type of software designed to cause damage to a computer. Malware can steal sensitive information from your computer, gradually slow down your computer or even send fake emails from your email account without your knowledge.

DoS Attack

Its purpose is usually to crash the system. It does this by overloading the target network or site with bogus system requests, preventing legitimate users from accessing it and sometimes crashing or damaging the system. DoS attacks can last from a few hours to several months.

Cyber ​​Defamation

Any derogatory statement which is intended to harm the name or reputation of a person on a website or sending an e-mail containing defamatory information to another person is a crime of cyber defamation.

Copyright Cyber ​​Crime

The original owner of the copyright is protected from dishonest copying and the intention to obtain illegal profit is to be stopped. With the explosion of digitization and the Internet, music, graphics/pictures, books, films, trade secrets, trademarks, theft of computer source code etc. are copied and distributed illegally. This is a punishable offence under copyright rights.

Cryptocurrency Fraud

Cryptocurrency has suddenly become very popular among the people and cunning thugs are trapping people in their net by showing them tempting dreams or luring them and making them invest in a world which does not exist. People are asked to invest in cryptocurrency by adding them to groups created on social media by the thug gang. A link to software created by the thug gang is given, which the person downloads and invests money in it. After investing, the customer starts seeing rupees in dollars in his account.

Cyber ​​terrorism

Cyberterrorism is defined as “a cyber attack using a computer or communication network which is done to spread unrest and chaos in the country and benefit another country or foreign group. Conspiracy to commit such a crime is also a crime. Today, apart from railways, airlines, banks, stock market, and hospitals, all the services related to normal life are connected to computer networks, many of these are completely dependent on the Internet, if their network is tampered with, then its consequences can be very dangerous.

In case of cybercrime, immediately register a complaint on Cyber ​​Crime Helpline No. 155260 or Cyber ​​Crime Reporting Portal www.cybercrime.gov.in.

More articles ―

Get the latest news

Stay up to date with all of our posts and content and see what the latest venues are throughout the entire East Coast of the United States of America