Characteristics Of Cyber Crime

993 Words4 Pages
Cyber Crime Includes Following are the few examples of cyber crime:  Cyber stalking: Online harassment and online abuse all comes under stalking. It generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Cyber stalking shares important characteristics with offline stalking; many stalkers (online or off) are motivated by a desire to control their victims. A major damaging effect of online abuse is a victim avoiding his/her friends, family and social activities.  Intellectual Property Crimes: Intellectual property consists…show more content…
A cyber crime called 'Bot Networks', when hackers remotely take control upon computers by using malware software. Computers can be co-opted into a botnet when they execute malicious software. A botnet's originator can control the group remotely.  Transmitting Virus: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computerize system of the individuals.  Hacking: In general words hacking means seeking and exploiting weakness and security of a computer system or a computer network for unauthorized access. The person who do hacking is known as hacker. Hacker use computer expertise and some tool or scripts to hack any computer system.  Internet Time Thefts: Basically, Internet time theft comes under hacking. It is the use by an unauthorized person, of the Internet hours paid for by another person. The person who gets access to someone else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s…show more content…
Debit and Credit cards used by criminals for their monetary benefits through withdrawing money from the victim’s bank account.  E-Mail/SMS Spoofing: A spoofed E-mail/ SMS may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates. Here an offender steals identity of another in the form of email address, mobile phone number etc and send message via internet.  Cross-site Scripting: Cross-site scripting (XSS) is a type of computer security vulnerability. By cross-site scripting attacker can bypass the predefine access permissions of website. Reflected XSS is the most frequent type of XSS attack. Reflected XSS attack is also known as non-persistent XSS. Scripting languages like java script, VBScript etc are use for Reflected XSS attack.  Cyber Squatting: Squatting is the act of occupying an abandoned or unoccupied space. Cyber squatting is the act of registering a famous domain name and then selling it to needy in high cost. It means where two persons claim for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that

More about Characteristics Of Cyber Crime

Open Document