TYPES OF CYBERCRIME

Anany sharma
4 min readJan 18, 2021

Cybercrime is an illegal activity that targets computers, a computer network, or a machine. In simple words It is an act of bullying, harassing, or threatening someone using the Internet.

Types of cyber crime

1-Cyber Terrorism.

2-Phishing.

3-Email and internet fraud.

4-Computer Hacking.

5-Spamming.

6-Email and internet fraud.

7-Web Jacking.

1-Cyber terrorism

The objectives of such terrorists may be political or ideological since this can be considered a form of terror. pro. terrorists, who are very smart in hacking can cause damage to government systems, Army records, national security …… and the country suffered from a huge economical loss.

2-Phishing

The purpose of phishing is to steal information like username, password, and debit card number, online transaction passwords must be used to steal money from users. It is a type of cyber attack that uses email as a cyber weapon. The attacker makes a fake page of any trusted website /company and you put your personal information like Username, passwords, credit card information, etc, and you become a victim very easily.

3-E-mail and internet fraud.

EXAMPLE OF E-MAIL FRAUD

The I LOVE YOU virus comes in an e-mail note with I LOVE YOU (love letter) in the subject line and contains an attachment with Trojan and the results in the message being re-sent to everyone in Microsoft outlook. the result on the device is a loss of every JPEG, MP3.

4-Computer Hacking.

The intention of hacking a computer to stealing, or destroying data for revenge, economic or political reasons. Now the companies or government are hiring Ethical hackers, the person who is expert in hacking computers, to intentionally protect data, web, servers, software from bad hackers (Black hat hackers). Basically, there are two types of hackers — — — — -

BLACK HAT - Black hat hackers hack the system with bad intentions. They hack the machine/network for stealing money or user's personal information They find the bugs and loopholes in the machine, and sell the information to the market or use it personally.

WHITE HAT- white hat hackers are the persons who hack the system for security purposes and warned the person or organizations so that they may take quick action for secure servers. Basically, they work for government, organizations or as a freelancer. They are also known as ethical hackers.

Follow and share WIZARDING CODES!!

5-Web Jacking

In these kinds of cases, the black hat hackers gain access and make his/her control the website He changes the text/information on the webpages.

Prevention from cyber attacks

1- ENCRYPTION

Encryption is a technique to convert the text into codes using algorithms. The code is so elaborate the powerful computer will take years to break the code. In computing lang. unencrypted text is called plaintext and encrypted data is called ciphertext. After users received the data they decode it using the key. This method is called decryption.

2- Use antivirus

There is much malware like worms, trojan horses, etc that are spread over the internet to destroy data and steal sensitive information or passwords from the computer. To prevent this malware to enter your computer, a special program called an anti-virus is intentionally designed to protect the system against unwanted/harm full programs. There are lots of harm full programs coming every day. The antivirus program regularly updates and provides security to the system against this new malware.

Types of Antivirus available in the market — —

1-Avira

2-ClamWin

3-Avast

4-K7

5-WINDOWS firewall

6-Dr web

7-F-secure

8-G data software

3-GENERATE STRONG PASSWORD

A strong password should be a combination of commas, signs, parentheses, lower-case letters, upper-case letters, percent, and numbers. Do not use a word that would be in the dictionary or letters that are sequential on a keyboard.

Example of good passwords.

caps@3216

ZZYY{23}

user353#

world4//5

DoGs$326

Example of some bad passwords generally user generate.

123

12345

I love you

11223344

Akash(name)

akash123

How hackers find out our passwords ?

1-They guess it — — generally users use passwords on children’s name, boyfriends name, and also pet name, so this is the easy way to guess it.

3- Phishing — — — Attacker makes a fake page of any trusted website /company and you put your personal information like Username, passwords, credit card information etc, and you become a victim very easily.

Quotes on cyber security

1-Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — — — — — -Martina Navratilova

2- Information is wealth

2-We’re all going to have to change how we think about data protection. — — -Elizabeth Denham

So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA

--

--

Anany sharma

Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — Martina Navratilova.