Cybercrime is the most common crime and plays a terrific role in today’s technology dependent world. The number of cybercrime cases are increasing daily, and so are the types of cybercrimes. Fraudsters are exploring new ways to make money while deceiving one of us through their tricks. To combat this, being aware and alert is the ultimate key to fight cybercrimes and types of cybercrimes. Let’s see what the concept is all about.
Though the Internet Technology Act, 2000 does not per se define Cybercrimes, it can be understood as a criminal activity that takes place on or over the computer network, the Internet, or any other information technology. With the increasing use of the Internet and computers in daily life, cybercrime is also increasing. The Internet provides convenience to the users, but it has dark sides as well.
Examples of cybercrimes could be unauthorized access to data and applications, someone using your display picture in another social media account to lure your network for sending money, digitally distributing child pornography, designing a fake website to look like real ones to steal confidential data or money, or spreading the virus, etc.
Types of Cybercrimes
Here, some of the major types of cybercrimes have been explained to give a gist of how that crime takes place:
1. Hacking
Hacking in simple terms means an illegal intrusion into a computer system or network. Hacking is dangerous because it can lead to unauthorized use of sensitive and private data for ill purposes.
2. Cyber Stalking
This term is used to refer to the use of the internet, e-mail, or other electronic communications devices to stalk another person. Stalking is an offence under the Bharatiya Nyaya Sanhita and also includes cyber stalking.
3. Denial of Service (DOS)
This is a technology cyber intrusion, where the influencers flood the bandwidth or block the user’s mail with spam mail depriving the user, of access to the internet and the services provided therefrom.
4. Malware (Dissemination of Malicious Software)
A malware is a software designed to perform an unwanted illegal act via the computer network. For example:
a) Virus
A virus is a program that can infect other programs by modifying or destroying them to include a possible evolved copy of itself.
b) Worms
Worms are also disseminated through computer networks, unlike viruses. Computer worms are malicious programs that copy themselves from the system, rather than infiltrating legitimate files.
c) Trojans
Trojan is another form of malware. Trojans do things other than what is expected by the user. This affects user experience of the computer applications.
d) Hoax
A hoax is an e-mail that warns the user of a certain system that is harming the computer.
5. Spyware
Spyware invades a computer and, as its name implies, monitors a user’s activities without authority or consent.
6. Internet Fraud
Internet fraud is a type of cybercrime that makes use of the Internet and it can be considered a general term that groups all of the crimes that happen over the Internet like spam, banking fraud, theft of service, etc.
7. Identity Theft
Identity theft occurs when a cyber criminal uses another person’s personal data like credit card numbers or personal pictures without their permission to commit fraud, crime or illegitimate gains.
8. Social Engineering
Social engineering involves criminals directly approaching you. Most commonly, they reach you by phone or email. Then they manipulate you, and most often pretend to be a customer service agent, so you let them have the information they want. Usually a password, or your job or bank information is shared which leads them to commit cybercrimes.
9. Phishing
Phishing is a type of cybercrime where attackers pose as legitimate organizations or individuals to trick people into revealing sensitive information, such as passwords, credit card numbers, or personal identification details. This is often done through deceptive emails, text messages, or fake websites that appear trustworthy.
10. Ransomware
Ransomware attacks are a form of cybercrime where malicious software encrypts a victim’s files or entire system, rendering them inaccessible. The attackers then demand a ransom, usually in cryptocurrency, in exchange for the decryption key that will allow the victim to regain access to their data.
11. Cyberterrorism
Cyberterrorism refers to the use of the internet to carry out terrorist attacks to cause harm and destruction usually in a way that leads to mass hysteria or fear.
12. Insider Threats
Insider cybercrime is a type of cyber-attack in which employees use their authorized access to a company’s computer system and other resources for the wrong reason, i.e. to corrupt it or just to steal.
13. AI-Powered Attacks
AI-powered cybercrime attack is an act of cybercrime that employs artificial intelligence for attacking a computer system. They may be used to harvest personal data from an individual or carry out a disruptive cyber-attack.
14. Smishing
Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites, or downloading malicious content via phone or web.
15. Child Pornography OR Child sexually abusive material (CSAM)
Child sexually abusive material (CSAM) refers to a material containing sexual media in any form, of a child who is abused or sexually exploited. Section 67 (B) of the IT Act states that it is punishable to publish or transmit material depicting children in the sexually explicit act, etc. in electronic form.
Know how to avoid cyber bullying
Conclusion
To stay safe online, use strong passwords, be cautious with emails and links, use anti-virus software, keep personal information private, and report suspicious activities. Laws like Information Technology Act 2000 and Cyber Cells help combat cybercrimes. However, cybercrime is a growing concern, therefore, awareness and vigilance are crucial. Additionally, governments need to cooperate to beef up cybersecurity and catch cybercriminals. Everyone — Police, lawmakers, businesses, and people who use the internet should work together to make cyberspace a better and safe place for everybody and stop cybercrimes.
The types of cybercrimes have been explained by our intern, Ms Pallavi Daruka. She has been assisting the team in bringing informational legal blogs.