In Cyber Stalking, a cyber criminal uses the internet to consistently threaten somebody. This crime is often perpetrated through email, social media, and the other online medium. Cyber Stalking can even occur in conjunction with the additional ancient type of stalking, wherever the bad person harasses the victim offline.
There’s no unified legal approach to cyber Stalking, however, several governments have moved toward creating these practices punishable by law. Social media, blogs, image sharing sites and lots of different ordinarily used online sharing activities offer cyber Stalkers with a wealth of data that helps them arrange their harassment. It includes actions like false accusations, fraud, information destruction, threats to life and manipulation through threats of exposure. It has stalkers take the assistance of e-mails and other forms of message applications, messages announce to an online website or a discussion cluster, typically even the social media to send unwanted messages, and harass a specific person with unwanted attention. Cyber Stalking is typically cited as internet stalking, e-stalking or online stalking.
Types of Cyber Stalking:
- Webcam Hijacking:
Internet stalkers would attempt to trick you into downloading and putting in a malware-infected file that may grant them access to your webcam. the method is therefore sneaky that it’s probably you wouldn’t suspect anything strange.
- Observing location check-ins on social media:
In case you’re adding location check-ins to your Facebook posts, you’re making it overly simple for an internet stalker to follow you by just looking through your social media profiles.
Catfishing happens via social media sites, for example, Facebook, when internet stalkers make counterfeit user-profiles and approach their victims as a companion of a companion.
- Develop the habit of logging out of the PC when not in use.
- Remove any future events you’re close to attending from the social networks if they’re recorded on online approaching events and calendars.
- Set strong and distinctive passwords for your online accounts.
- Cyber Stalkers can exploit the low security of public Wi-Fi networks to snoop on your online activity. Therefore, avoid sending personal emails or sharing your sensitive info when connected to an unsecured public Wi-Fi.
- Make use of the privacy settings provided by the social networking sites and keep all info restricted to the nearest of friends.
- Do a daily search on the internet to search out what information is accessible regarding you for the public to check.
- Cyber Crime
- Cyber Law (IT Law) in India
- Cyber Criminals and its types
- Information Security and Cyber Laws
- Difference between Cyber Security and Information Security
- Channel Allocation Strategies in Computer Network
- Difference between Fixed and Dynamic Channel Allocations
- Difference between Spoofing and Phishing
- Introduction of Botnet in Computer Networks
- Difference between Bandwidth and Throughput
- Difference between EIGRP and OSPF
- OSI, TCP/IP and Hybrid models
- Local Broadcast and Loopback Address
- Internet of Things Based on Compressive Sensing
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.