It can be classified in to 4 major categories as
- Cyber crime against Individual
- Cyber crime Against Property
- Cyber crime Against Organization
- Cyber crime Against Society
- Against Individuals
- Email spoofing :
A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source - Spamming :
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. - Cyber Defamation :
This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information. - Harassment & Cyber stalking :
Cyber Stalking Means following the moves of an individual’s activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms, user net groups.
- Email spoofing :
- Against Property:
- Credit Card Fraud :
- Intellectual Property crimes : These include Software piracy: illegal copying of programs, distribution of copies of software.
- Copyright infringement:
- Trademarks violations:
Theft of computer source code:
- Internet time theft :
the usage of the Internet hours by an unauthorized person which is actually paid by another person.
- Against Organisation
- Unauthorized Accessing of Computer:
Accessing the computer/network without permission from the owner.
it can be of 2 forms:- Changing/deleting data:
Unauthorized changing of data. - Computer voyeur:
The criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed.
- Changing/deleting data:
- Denial Of Service:
When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. - Computer contamination / Virus attack :
A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it.
Viruses can be file infecting or affecting boot sector of the computer.
Worms, unlike viruses do not need the host to attach themselves to. - Email Bombing :
Sending large numbers of mails to the individual or company or mail servers thereby ultimately resulting into crashing. - Salami Attack :
When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes. - Logic Bomb :
Its an event dependent programme , as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities. - Trojan Horse :
an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. - Data diddling :
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
- Unauthorized Accessing of Computer:
- Against Society
- Forgery: currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality scanners and printers.
- Cyber Terrorism: Use of computer resources to intimidate or coerce others.
- Web Jacking: Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money.