types of Cyber crimes

Types of Cyber Crimes ❖ General Intrusions ✧ Hacking, spyware, phishing, pharming, ✧ Sending computer viruses & worms to inv...

Types of Cyber Crimes

❖ General Intrusions
✧ Hacking, spyware, phishing, pharming,
✧ Sending computer viruses & worms to invade computers
✧ Causing denial of service attacks
✧ Creating bots, Trojan horses, zombie machines

 

❖ Nuisances (usually non-violent activities)
✧ Sending spam
✧ Changing web page text and images
✧ Redirecting websites

 

❖ Personal Identity Theft (using someone else’s name or credit)
✧ Phishing for private information, passwords, code numbers
✧ Making unauthorized purchases with stolen credit cards or ID
✧ Destroying personal reputation
✧ Damaging personal credit ratings

 

❖ Theft of Intellectual Property (stealing ideas or creations of others)
✧ Downloading copyrighted music & videos
✧ Plagiarism, cheating
✧ Software piracy

 

❖ Physical or Mental Damage
✧ Cyberbullying, harassment
✧ Cyberstalking
✧ Sexual exploitation of minors, child pornography

 

❖ Terrorism
✧ Stealing military and private industry secrets – espionage
✧ Brainwashing and recruiting new followers
✧ Building terrorist communications network

 

General Intrusions

 1: sending Computer virus/Worm to invade computers

The ILOVEYOU virus comes in an e-mail note with “I LOVE YOU” in the subject line
and contains an attachment that, when opened, results in the message being re-sent to
everyone in the recipient’s Microsoft Outlook address book and, perhaps more seriously,
the loss of every JPEG, MP3, and certain other files on the recipient’s hard disk

 

2: Malware/trojans

A Trojan takes its name from the term ‘Trojan Horse’. It is a type of computer virus that
can be installed on your computer without you realising.

 

One variation of a Trojan installs a ‘keystroke logger’ on your computer. This records the
words and numbers you type when you use your computer keyboard. If you login to your
online bank account, the keystroke logger will record your login information.

 

It is suggested that you should use virtual keyboard while doing net banking. Virtual
Keyboard is an online application to enter password with the help of a mouse.The Virtual
Keyboard is designed to protect your password from malicious “Spyware” and “Trojan
Programs”. Use of Virtual keyboard will reduce the risk of password theft.

 

3: stealing internet user name and password

 

Trojan captured the username and password fields from
the dialup screen and sent a mail to the culprits in encrypted form

 

4: email Fraud

Quick degree scams – “Get your degree in 30 days!” “No studying required”, “Turn
your experience into a degree”. They say they are accredited and the degree is legal and
meaningful. That’s part of the scam.

 

Personal identity theft

Spamming, Redirecting websites & Phishing

 

5: Phishing

how does phishing happen?
• Phishers sets up a replica page of a known financial institution or a popular shopping
website
• Bulk e-mails are sent to users asking for their personal data like account details,
passwords etc
• When the user clicks on the link, the replica of the website will open. Or while the
user is online, a form will populate through an “in-session pop-up”
• On updation, the data goes to phishers. Post which the user is redirected to the
genuine website
Phishers have refined their technology to launch sophisticated attacks and use advanced
social engineering techniques to dupe online banking users.

 

7: Cyber bullying

 

8: Cyberstalking

 

how do they operate
a. Collect all personal information about the victim such as name, family background,
Telephone Numbers of residence and work place, daily routine of the victim, address of residence and place of work, date of birth etc. If the stalker is one of the acquaintances of the victim he can easily get this information. If stalker is a stranger to victim, he collects the information from the internet resources such Network Security 125
as various profiles, the victim may have filled in while opening the chat or e-mail account or while signing an account with some website.

 

9: Cyber Pornography

 

10: social networking

Ways to protect yourself on social networking sites:

limit who can see what you post

limit what you post
 

COMMENTS

TECH$type=three$author=hide

Name

5G Technology,1,Abbreviations,2,Agent AI,1,Agentic Ai,1,AI in Education,1,AI in Healthcare,1,AI in surgery,1,AI Reasoning,1,Algorithm,1,Algorithms,4,android,2,Artemis Mission,1,Artificial Intelligence,5,Artificial Intelligence AI,2,Artificial Neural Networks,1,ASCI and UNI),1,Augmented Reality,1,Automata,3,Blockchain,1,Blockchain Technology,1,C Language,2,C Programming,1,c#,1,C++,2,C++ Programming,1,CakePhp,1,Carbon Neutrality,1,CCNA,1,Cellular Communication,1,Chatgpt,1,Cloud Computing,4,Compiler Construction,1,Compiler Construction Solved MCQs,1,Compiler Design,1,Computer,18,Computer Applications,1,Computer Architecture,3,Computer Arithmetics,1,Computer Basics,1,Computer Codes (BCD,1,Computer Fundamentals,5,Computer Graphics,4,Computer Networking,2,Computer Networks,4,Computer Organization,1,Computer Science,2,Computer Short Cut Keys,1,Computer Short Keys,1,CPU Sceduling,1,Cryptocurrency,1,CSS,1,CSS PMS,1,Current Trends and Technologies,1,Custom Hardware,1,Cyber Security,6,Cybercrimes,1,DALL-E,1,Data Communication,1,Data Privacy,1,Data structures,3,Database Management System,4,DBMS,4,Deadlock,1,DeepSeek,1,Digital Systems,1,Digital Systems Solved MCQs - Part 2,1,Discrete Mathematics,2,Discrete Structure,1,dot Net,1,EBCDIC,1,Edge Computing,2,English,1,Ethical AI and Bias,1,Ethics,1,Explainable AI (XAI),1,File System,1,Flowcharts,1,General Data Protection Regulation GDPR,1,General Knowledge,1,Generative AI,2,Gig Economy,1,Graphics Designing,1,Helping Materials,1,HTML,1,HTML 5,1,hybrid work model,1,Inference Optimization,1,Information Systems,1,Information Technology,1,Inpage,1,intelligence,1,Internet,1,Internet Basics,1,Internet of Things,1,Internet of things IOT,2,IT,1,JavaScript,1,jQuery,1,Language,11,Languages Processor,1,Languge,1,Li-Fi,1,Linux/Unix,2,Magento,1,Memory Management,1,Microprocessor,1,Microsoft PowerPoint,1,MidJourney,1,mindfulness apps,1,MS Access,1,MS DOS,1,MS Excel,1,MS Word,2,Multimodal AI,1,NASA,1,Number System,1,Object Oriented Programming (OOP),1,Object Oriented Programming(OOP),1,Operating System,9,Operating System Basics,1,oracle,2,Others,1,Pakistan,1,PCS,1,PHP,1,PMS,1,Process Management,2,Programming,3,Programming Languages,1,Python,2,python language,1,Quantitative Aptitude,2,Quantum Computing,2,R Programming,1,Ransomware,1,Robotic Process Automation RPA,1,Robotics,2,Ruby Language,1,search engine optimization,1,Semester III,2,seo,1,Sloved MCQs on Microsoft Power Point - updated,1,Software Engineering,3,Solved MCQs of MS Access - Updated,1,Solved MCQs on Computer Fundamentals,1,SpaceX Starship,1,SQL,1,System Analysis and Design,1,Theory of Computation,1,Trends and Technologies,1,Virtual Reality,1,web,1,web Fundamental,1,Web Technologies,2,Web3,1,WEB3 Technology,1,x8086,1,zoology,1,
ltr
item
COMPUTER SCIENCE SOLVED MCQS: types of Cyber crimes
types of Cyber crimes
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLNvEZIU8m3lVLWKevPsmfceKFrzhbmrQsJGZepnHzR2LHqrYgsqWDUyi2Q3001sZY79Uqp6nCywdzzMNuFWYR7irBdlfQBbvIYucN3ch69T3P2ERJDRg4-tfYlacCWTtfiwPbF2nl528/s1600/1672731019611411-0.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLNvEZIU8m3lVLWKevPsmfceKFrzhbmrQsJGZepnHzR2LHqrYgsqWDUyi2Q3001sZY79Uqp6nCywdzzMNuFWYR7irBdlfQBbvIYucN3ch69T3P2ERJDRg4-tfYlacCWTtfiwPbF2nl528/s72-c/1672731019611411-0.png
COMPUTER SCIENCE SOLVED MCQS
https://cs-mcqs.blogspot.com/2022/12/types-of-cyber-crimes.html
https://cs-mcqs.blogspot.com/
https://cs-mcqs.blogspot.com/
https://cs-mcqs.blogspot.com/2022/12/types-of-cyber-crimes.html
true
1616963833964386058
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content