Cyber Crimes and Its Type
Cyber Crimes and Its Type
Pawan Duggal said that “Cybercrime refers to all activities done with criminal
intent in cyber space or using the medium of internet. These could be either the
criminal activities in the conventional sense or activities newly evolved with the
growth of the new medium. Any activities which basically offend human
sensibilities can be included in the ambit of cybercrimes.”
1
The Oxford Dictionary defines cybercrime as “Criminal activities carried out by
means of computers or the Internet.”
So, we can lastly define cybercrime simply as any harmful act which is done
using computer system on or against computer system, where the offender
needs to have knowledge of computer system.
History of Cybercrimes
The very first recorded cybercrime was even before the internet came into
existence in 1820. A textile manufacturer in France, Joseph-Marie Jacquard,
produced the loom. The device allowed the repetition of a series of steps within
the weaving of special fabrics. A fear grew amongst the employees that they
lose their job. They committed the act of sabotage to discourage jacquard from
using this new machine. And thus this was the first reported cybercrime.
2
Later 1940 first computer was invented which was so big that it could fit into a
room. It was not only big but was also expensive, not everyone could afford it.
Very few had direct access to it. In 1970s the technology became more
advanced and cyber criminals were also learning new techniques of committing
cyber offence. The first identified cyber crimes were computer intrusions and
fraud. The similar crime occurred in 1973, where a chief teller in Union Dime
Savings Bank misappropriated money from the corporate by manipulating
account data within the bank's computing system.
Later in 1980s businesses became more dependent on computers and from that
time the cases of cybercrime increased. The criminals could encrypt the data
easily, can store the data and could even transmit it. By this time computers
were started to be used as the tool to commit cybercrimes and also as the target.
The first person found guilty of cyber crime in 1981 was Ian Murphy (also
known as Captain Zap). He hacked a telephone company.
As we became more advanced by the 21st century the crimes related to computer
also became advanced. And at present there is multiple numbers of cybercrimes
which are hard to trace.
Nature of Cybercrimes
Characteristics of Cybercrimes
Classification of Cybercrimes
5
Cheating & Fraud: Stealing passwords or data storage, the
person doing this has guilty mind and this leads to fraud or
cheating.
Email spoofing: That email which misrepresents its origin,
means it is sent from somewhere else and it is showing its
origin at somewhere else.
Cracking Child Pornography: this includes distributing or
accessing the materials which sexually exploit the children.
Phishing: It is a type of internet fraud scam where the email is
sent in the name of company or any organisation and the
personal details of the receiver are extracted, etc.
ii. Crime against individual property:
Cyber vandalism: Destroying and damaging the data when a
network service is disrupted or stopped.
Virus transmission: These are the programs that attach itself to
the computer and spread in every files and document and which
may lead to deleting or destroying of those files or document.
Hacking systems
Cyber-squatting: Registering the name of well known company
or brands with an intention of reselling them at a profit.
Intellectual Property Crimes: An unlawful act because of which
the owner is partially or completely deprived of his rights.
Internet time thefts: This comes under hacking where the hacker
gets unauthorized access to someone else’s ISP ID and
password, without the owner’s knowledge, etc.
iii. Crime against Government or organisation:
Password sniffing: This is an attack which steals the user name
and password from the network.
6
Denial of service attacks: Shutting down of network or machine
through an attack, which causes problem to the user to access.
Virus attack
E-mail bombing: A kind of malicious act in which the mail box
overflows with large number of emails and which also causes
denial of access and other problems to the user.
Salami attack: Such type of attack in which the series of small
attacks take place which later result into a big attack and this
can go undetected because of its nature.
Cyber warfare: This is politically motivated hacking to conduct
sabotage and espionage.
Cyber terrorism: This is a terrorist attack on internet which is
dangerous to sovereignty and integrity of the country.
Possession of unauthorized information
Unauthorized control over computer system
Distribution of pirated software: This is distributed from one
computer to another with an intention to destroy the data and
official records of the Government.
Cyber vandalism: Damage or destruction in digital form maybe
of any website.
Intellectual Property related crimes
Cyber thefts: Theft by means of computer or internet, such as
identity theft, ID theft, Password theft, etc.
iv. Crime against society:
Cyber Pornography: Distributing or accessing the sexually
explicit materials or obscene material.
Online gambling: Kind of gambling conducted on internet.
7
Financial cybercrimes: Consists of different types of offences
like corruption, money-laundering, social fraud and tax fraud.
Cyber Trafficking: Trafficking for which internet is used for
trafficking drugs, human beings or weapons.
Cyber Forgery: The act of deceiving large number of people by
sending threatening mails as online business transaction.
Selling illegal products, etc.
Causes of Cybercrime
Cybercrimes are those crimes which takes place online. Therefore, the users
need to take some basic precautions to keep themselves safe from the
cybercrimes by:
9
share his/her personal information publicly the more safe he/she will
be.
iii. Keeping all the software up to dated: It is important to keep all the
software updated specially operating system and internet security
software. Cyber criminals most of the time use known flaws in the
software to access our computers.
iv. Using anti-virus/anti-malware: Keeping anti-virus and anti-malware
up to dated and scanning the local data regularly keeps the data safe
from any virus/malware. Free anti-virus/anti-malware does not
provide complete protection against most common virus/malware.
v. Using two factor authentication services: These security mechanisms
allow the user to add a second layer of authentication so that even if a
hacker has user’s Id and password, he won’t be able to log in to the
online account because he does not have the two factor authentication
code.
vi. Using VPN: Use of VPN helps keeping the third party companies
from spying on the person. The user can log in to a secure network
even if he/she is in a remote area.
vii. Keeping certain information private: There is certain information
which we should not share with anyone. One should not share his/her
phone number, email address, place of work, etc. on any social
networking sights.
viii. Talking to children about the internet: Children should be taught about
the internet. They should be taught about the acceptable and good use
of internet. They must be taught about the cybercrime risks and
parents must make sure that in case if they are experiencing some kind
if cyber harassment or bullying then they can talk to them. They must
keep an eye on their children’s activity on the internet.
10
11