Cyber crime or computer-oriented crime is a crime that includes a computer and a network. The computer may have been used in the execution of a crime or it may be the target.
Cyber crime is the use of a computer as a weapon for committing crimes such as committing fraud, identities theft or breaching privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to every field like commerce, entertainment and government. Cyber crime may endanger a person or a nation’s security and financial health.
Cyber crime encloses a wide range of activities but these can generally be divided into two categories:
- Crimes that aim computer networks or devices. These types of crimes involves different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
- Crimes that use computer networks to commit other criminal activities. These types of crimes include cyber stalking, financial fraud or identity theft.
Classification of Cyber Crime:
- Cyber Terrorism:
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of life. This may include different type of activities either by software or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
- Cyber Extortion:
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand huge money in return for assurance to stop the attacks and to offer protection.
- Cyber Warfare:
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations concerning to the threat of cyber attacks, espionage and sabotage.
- Internet Fraud:
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding of information or providing incorrect information for the purpose of deceiving victims for money or property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace.
- Cyber Stalking:
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. In this case, these stalkers know their victims and instead of offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
- Use strong password:
Maintain different password and username combinations for each account and resist the temptation to write them down. Weak passwords can be easily cracked using certain attacking methods like Brute force attack, Rainbow table attack etc.
- Use trusted antivirus in devices:
Always use trustworthy and highly advanced antivirus software in mobile and personal computers. This leads to the prevention of different virus attack on devices.
- Keep social media private:
Always keep your social media accounts data privacy only to your friends. Also make sure only to make friend who are known to you.
- Keep your device software updated:
Whenever your get the updates of the system software update it at the same time because sometimes the previous version can be easily attacked.
- Difference between Cyber Security and Information Security
- Virtual Organization | Information Security & Cyber Laws
- Need Of Information Security
- What is Information Security?
- Information Security | E-Governance
- Threats to Information Security
- Information System and Security
- Information Security | Integrity
- Information Security | Confidentiality
- Risk Management for Information Security | Set-2
- Risk Management for Information Security | Set-1
- Information Security | Digital Forensics
- Information Security and Computer Forensics
- Information Security | Intellectual Property Rights
- Information Security | Electronic Data Interchange
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.