What is cyber crime?
Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.
TYPES OF CYBERCRIME
The following list presents the common types of cybercrimes-
1-Computer Fraud-Intential deception for personal gain via the use of computer system.
2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.
3-Identity theft-Stealing personal information from somebody and impersonating that person.
4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.
5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.
6-Electronic money laundering-This involves the use of the computer to launder money.
7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.
8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
9-Spam:sending unauthorized emails.
These emails usually contain advertisements.
CYBER LAW
Under The Information Technology Act,2000
CHAPTER XI-OFFENCES-66. Hacking with computer system.
1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
2-whoever commits hacking shell be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees,or with both.
Related word
- Hacker Hardware Tools
- Hacker Tools Github
- Hack Website Online Tool
- Physical Pentest Tools
- Hacker Tools For Ios
- Pentest Tools Website Vulnerability
- Pentest Tools Github
- Hacker Security Tools
- Tools 4 Hack
- Pentest Tools Review
- Hacker Search Tools
- Hack Tools Pc
- Hacking App
- Hacking Tools Mac
- Hacking Tools Software
- Hacker Tools Apk
- Hacker Tools For Pc
- Pentest Reporting Tools
- Pentest Tools Android
- Pentest Tools Linux
- Physical Pentest Tools
- Usb Pentest Tools
- Free Pentest Tools For Windows
- Blackhat Hacker Tools
- Hacking Tools Pc
- Hack Tools For Mac
- Hacker Tools For Ios
- Hacking Tools For Windows 7
- Hacking Tools And Software
- Pentest Tools Tcp Port Scanner
- Growth Hacker Tools
- Blackhat Hacker Tools
- Hacking App
- Hacker Search Tools
- Pentest Tools For Android
- Hacking Tools Usb
- Pentest Tools Android
- Hacker Tools For Mac
- Hack Tools Mac
- Hack Tools For Games
- Pentest Tools Kali Linux
- Hacker Techniques Tools And Incident Handling
- Hacker Tools 2019
- Pentest Tools Linux
- Hacking Apps
- Hacking Tools Kit
- Hacker Tools Hardware
- Best Hacking Tools 2019
- Hacking Tools Software
- Hacker Tools
- Hack Tools For Mac
- Hacking Tools For Beginners
- Ethical Hacker Tools
- Pentest Box Tools Download
- Underground Hacker Sites
- Hacker Tools Free
- Android Hack Tools Github
- Hacker Tools Online
- Hacker Tools Software
- Hacker Security Tools
- Pentest Recon Tools
- Pentest Tools For Ubuntu
- Pentest Tools Review
- Hacker
- Ethical Hacker Tools
- Hacker Tools For Windows
- Hacking Tools For Windows 7
- Growth Hacker Tools
- Best Hacking Tools 2020
- Pentest Recon Tools
- Android Hack Tools Github
- Hacker Tools Online
- Pentest Tools Apk
- Pentest Tools Review
- Pentest Tools Bluekeep
- Hacker Tools For Mac
No comments:
Post a Comment