What is cyber crime?
Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.
TYPES OF CYBERCRIME
The following list presents the common types of cybercrimes-
1-Computer Fraud-Intential deception for personal gain via the use of computer system.
2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.
3-Identity theft-Stealing personal information from somebody and impersonating that person.
4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.
5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.
6-Electronic money laundering-This involves the use of the computer to launder money.
7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.
8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
9-Spam:sending unauthorized emails.
These emails usually contain advertisements.
CYBER LAW
Under The Information Technology Act,2000
CHAPTER XI-OFFENCES-66. Hacking with computer system.
1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
2-whoever commits hacking shell be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees,or with both.
Related articles
- Pentest Tools Framework
- Hak5 Tools
- Android Hack Tools Github
- Hacker Tools For Pc
- Pentest Tools For Windows
- Hack Tools
- Hacker Tools Linux
- What Is Hacking Tools
- Hacking Tools For Games
- Hacker Tools Mac
- Pentest Tools Download
- Pentest Tools Alternative
- Hack Apps
- Hacker Security Tools
- Pentest Tools Review
- Hacker Tools For Ios
- Hack App
- Hack App
- Nsa Hacker Tools
- Hack Tools Pc
- Hacking Tools Free Download
- Blackhat Hacker Tools
- Hacker Tools Mac
- Hacking Tools Pc
- Nsa Hack Tools
- Pentest Automation Tools
- Pentest Tools Alternative
- Hacker Tools Free Download
- Hacking Tools And Software
- Tools For Hacker
- Best Pentesting Tools 2018
- Hacks And Tools
- Hack Tools For Pc
- Best Pentesting Tools 2018
- Hacker Search Tools
- Hacker Security Tools
- Hack Tools Pc
- Pentest Tools Alternative
- Hacking Tools Pc
- Hacking Tools For Windows Free Download
- Hacker Tools Free Download
- Hacking Tools Hardware
- Hack Tools For Ubuntu
- Pentest Automation Tools
- Best Hacking Tools 2020
- New Hacker Tools
- Hacker Tools Software
- Hacker Tools List
- Pentest Tools For Android
- Game Hacking
- Hacker Hardware Tools
- Hacker Tool Kit
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Ios
- Blackhat Hacker Tools
- Pentest Tools Url Fuzzer
- Hackers Toolbox
- Hack App
- Pentest Tools Android
- Hack Tools For Games
- Beginner Hacker Tools
- Pentest Tools For Ubuntu
- Hacker Tools Windows
- Blackhat Hacker Tools
- Pentest Tools Subdomain
- Hacking Tools For Windows 7
- How To Make Hacking Tools
- Hacking Tools Software
- Hacker Tools Online
- Hacking Tools Mac
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Easy Hack Tools
- Pentest Tools Review
- Pentest Tools For Ubuntu
- How To Install Pentest Tools In Ubuntu
- Tools 4 Hack
- Hacking Tools And Software
- Hacking Tools For Windows
- Hacker Tools For Mac
- Tools Used For Hacking
- Pentest Tools Free
- Hacker Tools Apk
- New Hacker Tools
- Tools For Hacker
No comments:
Post a Comment