11801322110_AKASH.KHAN (1)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

BIRBHUM INSTITUTE OF ENGINEERING AND

TECHNOLOGY
NAME- AKASH KHAN
ROLL NO- 11801322110
REG NO- 221180120032
SEMESTER- 7th
YEAR- 4th
SESSION- 2024-25
Department-Civil Engineering
SUBJECT-Cyber Law & Ethics

SUBJECT CODE-CE(OE)701C

Topic Name-Different types of Cybercrime and different types of Cyberoffenses


Discuss about Cybercrime, Cybercriminals, Passive Attacks ,Active Attacks ,
Cyberstalking, Attack Vector ,Cloud Computing
CYBER CRIME

Cyber crime, as the name suggests, is the use of


digital technologies such as computers and the
internet to commit criminal activities. Malicious actors
(often called “cyber criminals”) exploit computer
hardware, software, and network vulnerabilities for
various purposes, from stealing valuable data to
disrupting the target’s business operations.
The different types of cyber crime include:
•Hacking: Gaining unauthorized access to a computer system or account,
often to inflict further damage on the target
•Phishing: Impersonating legitimate companies or individuals to trick users
into revealing sensitive information
•Malware: Spreading malicious software such as viruses, worms, Trojans,
and ransomware within a device or network
•Identity theft: Stealing personal data such as names, addresses, and
social security numbers to fraudulently assume someone’s identity
Different types of Cyberoffences
1. Cyber Bullying
It is also known as online or internet bullying. It includes sending or sharing harmful and humiliating content
about someone else which causes embarrassment and can be a reason for the occurrence of psychological
problems. It became very common lately, especially among teenagers.
2. Cyber Stalking
Cyberstalking can be defined as unwanted persistent content from someone targeting other individuals online
with the aim of controlling and intimidating like unwanted continued calls and messages.
3. Software Piracy
Software piracy is the illegal use or copy of paid software with violation of copyrights or license restrictions.

An example of software piracy is when you download a fresh non-activated copy of windows and use what is
known as “Cracks” to obtain a valid license for windows activation. This is considered software piracy.

Not only software can be pirated but also music, movies, or pictures.
4. Social Media Frauds
The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or
sending intimidating or threatening messages. And one of the easiest and most common social media frauds is
Email spam.
5. Online Drug Trafficking
With the big rise of cryptocurrency technology, it became easy to transfer money in a secured private way and
complete drug deals without drawing the attention of law enforcement. This led to a rise in drug marketing on
the internet.

Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online, especially on what is
known as the "Dark Web".
6. Electronic Money Laundering
Also known as transaction laundering. It is based on unknown companies or online business that makes
approvable payment methods and credit card transactions but with incomplete or inconsistent payment
information for buying unknown products.

It is by far one of the most common and easy money laundering methods.
What is Cybercrime?

Cybercrime can be defined as “The illegal usage of any communication device to commit or facilitate in
committing any illegal act”.

A cybercrime is explained as a type of crime that targets or uses a computer or a group of computers
under one network for the purpose of harm.

Cybercrimes are committed using computers and computer networks. They can be targeting individuals,
business groups, or even governments.

Investigators tend to use various ways to investigate devices suspected to be used or to be a target of a
cybercrime.
Cybercriminals
A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal activities known as
cybercrimes. They can be individuals or teams.

Cybercriminals are widely available in what is called the “Dark Web” where they mostly provide their illegal
services or products.

Not every hacker is a cybercriminal because hacking itself is not considered a crime as it can be used to reveal
vulnerabilities to report and batch them which is called a “white hat hacker”.

However, hacking is considered a cybercrime when it has a malicious purpose of conducting any harmful
activities and we call this one “black hat hacker” or a cyber-criminal.

It is not necessary for cybercriminals to have any hacking skills as not all cyber crimes include hacking.

Cybercriminals can be individuals who are trading in illegal online content or scammers or even drug dealers. So
here are some examples of cybercriminals:
- Black hat hackers
- Cyberstalkers
- Cyber terrorists
- Scammers
Classifications of Cybercrimes

Cybercrimes in general can be classified into four categories:

1. Individual Cyber Crimes:


This type is targeting individuals. It includes phishing, spoofing, spam, cyberstalking, and more.
2. Organisation Cyber Crimes:
The main target here is organizations. Usually, this type of crime is done by teams of criminals
including malware attacks and denial of service attacks.
3. Property Cybercrimes:
This type targets property like credit cards or even intellectual property rights.
4. Society Cybercrimes:
This is the most dangerous form of cybercrime as it includes cyber-terrorism.
Passive attack

A passive attack is a type of network attack which involves monitoring and occasionally
scanning a system for open ports and vulnerabilities without actually tampering or
altering with the data. A passive attack doesn't directly harm the target; instead, its
goal is to learn more about the system that is the target .

Active attack
An active attack is an attempt to alter your computer network systems resources or operations
by making changes to your existing data, modifying data in transit, or inserting data into the
system. The main objective of an active attack is to interfere with the way your network
performs its operations by either modifying the target data or introducing new data into your
system or device. Think of all the activities a hacker can perform while compromising your
network server or computer, they can be grouped under active attacks. The hacker will try to
manipulate data to harm the target's computer network system.
What is Cyberstalking?
Cyberstalking is the use of the internet or digital tools to repeatedly harass,
threaten, or stalk someone. It includes sending unwanted messages, hacking
accounts, or spreading lies online. The goal is often to scare or distress the victim.
Cyberstalkers often use social media, email, or other online platforms. Cyberstalking
involves using digital platforms to intimidate or control someone by continuously
monitoring or harassing them online, they can track the victim’s online activity.
Cyberstalkers may impersonate their victims, post false information, or make
threatening comments. They often create multiple accounts to avoid detection and
can track the victim’s location or personal activities using GPS or spyware.
Cyberstalking can results into offline threats and is a serious situation of destruction
of privacy which can often requires legal action to stop. Cyberstalking is harmful and
illegal.
Attack Vector

An attack vector, or threat vector, is a way for attackers to enter a


network or system. Common attack vectors include social engineering
attacks, credential theft, vulnerability exploits, and insufficient protection
against insider threats.

Cloud Computing
Cloud users should enable MFA for all their cloud accounts to prevent unauthorized
access. Unpatched software is another common cause of cloud cyber crimes.
Cyber criminals can exploit vulnerabilities in cloud software to gain unauthorized
access to cloud resources or execute malicious code.
REFERENCES-GOOGLE
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy