0% found this document useful (0 votes)
14 views3 pages

Answer 4

Cybercrime in India includes various illegal activities involving computers, such as unauthorized access, web hijacking, and cyberstalking. Key types of cybercrime discussed include hacking, child pornography, denial of service attacks, and phishing, each with distinct characteristics and impacts. Cyber terrorism is highlighted as a growing concern due to its cost-effectiveness, anonymity, and potential to target critical infrastructure.

Uploaded by

Ila Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

Answer 4

Cybercrime in India includes various illegal activities involving computers, such as unauthorized access, web hijacking, and cyberstalking. Key types of cybercrime discussed include hacking, child pornography, denial of service attacks, and phishing, each with distinct characteristics and impacts. Cyber terrorism is highlighted as a growing concern due to its cost-effectiveness, anonymity, and potential to target critical infrastructure.

Uploaded by

Ila Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Answer 4

Introduction

Cybercrime is any illegal activity or crime in which a computer is utilized as a tool, a target,
or both. Or, to put it another way, cybercrimes in India encompass anything from denial-of-
service assaults to online cracking and are defined as any unapproved access to a computer
system without the consent of the system's legitimate owner or location of illegal activity.

Different Kinds of Cyber Crime-

1) Unauthorized Access and Hacking: - Any type of access without the consent of the
legitimate owner or the person in control of the computer, computer system, or
computer network is referred to as unauthorized access. An unauthorized entry into a
computer system or network is referred to as hacking. Hacking is any action taken
with the intention of breaking into a computer or network. Hackers attack the target
computer by writing their own programs or by using pre-made ones. They are driven
to destroy, and they derive pleasure from doing so. Some hackers commit financial
crimes for their own financial benefit. Examples of these crimes include credit card
fraud and money transfers from multiple bank accounts to their own account for
subsequent cash withdrawals. The websites that hackers most frequently target are
those run by governments.

2) Web Hijacking- Web hijacking means taking forceful control of another person’s
website. In this case the owner of the website loses control over his website and its
content.
3) Pornography- Pornography is defined as the display of sexual behaviours with the
intention of arousing sexual desire. Pornographic websites, computer-produced
pornographic periodicals, and online pornography accessed through mobile devices
are all included in the definition of pornography.
4) Child pornography- Children are being sexually abused via the Internet in large
numbers. It is possible for youngsters to become victim to cybercrime. Since
computers and the internet are now necessities in every home, children have easy
access to it. Pornographic content is easily accessible on the internet. Paedophiles try
to meet youngsters for sex or snap pictures of them in their underwear, sometimes
even engaging in sexual poses, after luring them in with pornographic material.
Paedophiles occasionally pose as teenagers or kids their own age to approach
youngsters in chat rooms, after which they start to get to know them better and gain
their trust. Then starts actual exploitation of the children by offering them some
money or falsely promising them good opportunities in life. The paedophiles then
sexually exploit the children either by using them as sexual objects or by taking their
pornographic pictures in order to sell those over the internet.
5) Cyber Stalking- In general, stalking is defined as persistent acts of harassment
directed at the victim, such as following them, calling them incessantly, murdering
their pet, damaging their property, or leaving notes or items behind. Serious violent
behaviours, such as physically harming the victim, may occur after stalking.
Cyberstalking is the term for a cybercriminal's persistent use of internet resources to
harass or threaten a victim. The goal of both online and offline stalkers is to take over
their victim's life.
6) Denial of service Attack- In this attack, the perpetrator overloads the victim's
network with traffic or overflows his email account with unsolicited messages,
depriving him of the services he is legally authorized to receive or offer. The goal of
this type of attack is to overload the network with pointless traffic in order to cause it
to crash. Distributed Denial of Service (DDoS) attacks are another variation on the
standard denial of service attack, in which a large number of attackers are dispersed
geographically. Numerous denial-of-service attacks, like the Teardrop and Ping of
Death assaults, take advantage of flaws in the TCp/IP protocols. System
administrators can install software updates for all known DoS attacks to reduce the
damage they inflict.
7) Viruses-Programs that possess the ability to replicate themselves, infect other
programs, and spread to other programs are known as viruses. Worms are computer
programs that replicate similarly to viruses but move from one computer to another.
These are software viruses that affix themselves to other programs. The malevolent
entities include viruses, worms, Trojan horses, time bombs, logic bombs, rabbits, and
bacterium. Viruses typically impact computer data by erasing or changing it. Worms,
on the other hand, just replicate themselves in a functional way until they consume all
the resources. Trojan Horse is a program that appears to be helpful but really dampens
quiet. There are two components to Trojans: a client part and a server part.
8) Salami Attack- Financial crimes are committed with these attacks. Here, the trick is
to make the change so subtle that, in one instance, it would be entirely missed. For
instance, a bank employee might install a program on the bank's servers that takes a
little amount of money (let's say Rs. 5)per month out of each customer's account. The
bank staff will profit handsomely each month, but the account user is unlikely to
discover this illicit debit.
9) Phishing- Phishing is the practice of sending an email to a user purporting to be a
reputable company with the goal of tricking them into disclosing personal information
that will be used to steal their identity. The email instructs the recipient to go to a
website and update personal data that the authorized entity already possesses,
including bank account details, credit card numbers, and social security numbers.
However, the website is fraudulent and was created purely to steal user data. Through
mass spamming, the phisher hoped that a portion of the recipients would actually read
the email and see the credit card information that were listed.
10) Cyber Terrorism - The most likely targets are targeted attacks on military
installations, power plants, banks, air traffic control, trail traffic control, and telephone
networks. others, such as the fire, medical, police, and rescue services, etc.
For a number of reasons, cyberterrorism is a tempting alternative for contemporary
terrorists.
 It is cheaper than traditional terrorist methods.
 Cyber terrorism is more anonymous than traditional terrorist methods.
 The variety and number of targets are enormous.
 Cyber terrorism can be conducted remotely, a feature that is especially
appealing to terrorists
 Cyber terrorism has the potential to affect directly a larger number of people.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy