Recents in Beach

Classification of cybercrime

 According to Sarmah, Sarmah, and Baruah (2017), cybercrime can occur in multiple forms that include:

1) Cybercrime against an individual- committed by cyber criminals against a person like,

Ø Email spoofing- forging an email header wherein the message appears as if received from a source other than the actual source which appears to be known or legitimate

Ø Spamming- junk email or mass message that reaches through spam bots which crawl the internet in search of email addresses

Ø Cyber defamation- harms the reputation of the person in the eyes of others through cyber space

Ø Internet relay chat- rooms in which many people worldwide chat together and discuss techniques to hack, hold meetings or where paedophiles allure small children. They become places for extortions, sexual harassment and threats.

Ø Phishing- attackers gain login or account information by pretending to be reputable individuals or IT support

2) Cybercrime against property- includes vandalism of computers as well as intellectual crimes of copyright, patents and trademark. They include,

Ø Software piracy- unauthorised copying

Ø Copyright infringement- use of copyright materials like music, software or text

Ø Trademark infringement- unauthorised use of service mark or trademark

3) Cyber crime against organisation they include,

Ø Unauthorised changing or deleting data

Ø Unauthorised reading or copying confidential information

Ø Attacking the servers, overwhelming the victim‟s resources to make it difficult for them to use it

Ø Many emails are sent to an email address to flood the mailbox called email bombing

Ø Attacking the online database to seize customer information like bank and credit card details called salami attack. The hacker draws small amounts of money over time which goes undetected or for which no complaint is filed

4) Cyber crime against society- it includes

Ø Forgery- making false document, signature, currency or revenue stamp

Ø Web jacking- a fake website is created which when clicked on leads to victim to clicking another link and getting redirected to the fake page which buys time to get access and control over the victim‟s system.

Subcribe on Youtube - IGNOU SERVICE

For PDF copy of Solved Assignment

WhatsApp Us - 9113311883(Paid)

Post a Comment

0 Comments

close