What is cyber crime?
Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.
TYPES OF CYBERCRIME
The following list presents the common types of cybercrimes-
1-Computer Fraud-Intential deception for personal gain via the use of computer system.
2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.
3-Identity theft-Stealing personal information from somebody and impersonating that person.
4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.
5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.
6-Electronic money laundering-This involves the use of the computer to launder money.
7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.
8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
9-Spam:sending unauthorized emails.
These emails usually contain advertisements.
CYBER LAW
Under The Information Technology Act,2000
CHAPTER XI-OFFENCES-66. Hacking with computer system.
1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
2-whoever commits hacking shell be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees,or with both.
More information
- Pentest Reporting Tools
- Hacker Tools Apk Download
- Hack Tools
- Growth Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Pentest Tools Github
- Hacking Tools Mac
- Hack Website Online Tool
- Hacking Apps
- Easy Hack Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools Find Subdomains
- What Are Hacking Tools
- New Hacker Tools
- Pentest Recon Tools
- Hack Rom Tools
- Best Hacking Tools 2020
- Hacker Tools Apk Download
- Hacking Tools Hardware
- Hacking Tools Download
- Hacking Tools For Kali Linux
- Kik Hack Tools
- Hacking Tools Kit
- Hacking Tools Github
- Hacking Tools
- Nsa Hack Tools
- Nsa Hack Tools Download
- Pentest Tools Subdomain
- Hacking Tools For Mac
- Hacking Tools For Beginners
- Best Hacking Tools 2019
- Hack Tools
- Pentest Tools Free
- Hacking Tools Download
- Hack Tools For Mac
- Hacking Tools For Beginners
- Pentest Tools Nmap
- Usb Pentest Tools
- Pentest Tools Framework
- Hak5 Tools
- Pentest Tools Github
- Hacking Tools Pc
- Hacker Tools Software
- Hacking Tools Download
- Hak5 Tools
- Pentest Tools Website
- New Hack Tools
- Hack Tools Pc
- Pentest Tools List
- Pentest Tools Online
- Pentest Tools For Mac
- Hacker Tools Online
- Hacker Tools Hardware
- Hak5 Tools
- New Hack Tools
- Hack Tools
- Pentest Tools List
- Pentest Tools Github
- Pentest Recon Tools
- Pentest Tools Framework
- Hacking Tools Free Download
- Pentest Tools Url Fuzzer
- Hacking Tools And Software
- Wifi Hacker Tools For Windows
- Bluetooth Hacking Tools Kali
- Pentest Tools Apk
- Pentest Tools Apk
- World No 1 Hacker Software
- Hacking Tools 2019
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- What Are Hacking Tools
- Hack Tools For Games
- Pentest Box Tools Download
- Hacker Tools Linux
- Pentest Tools Website Vulnerability
- Hacking Tools And Software
- Hacker Tools Linux
- Hack Tools Online
- Pentest Tools Review
- Hacker Tools Linux
- Hack Tools
- Pentest Tools Apk
- Pentest Tools Tcp Port Scanner
- Pentest Reporting Tools
- Game Hacking
- Hack Tools For Games
- Growth Hacker Tools
No comments:
Post a Comment