Documente Academic
Documente Profesional
Documente Cultură
I.
Cybercrimes committed against individual persons include such types of crimes like
transmission of Child Pornography, Harassment of any one with the use of a computer
such as e-mail, Cyber Defamation, Hacking, Indecent exposure, Credit Card Fraud and
Dissemination of obscene material etc.
II. Cyber Crimes committed against property of Individuals include computer vandalism (It
is a process wherein there is a program that performs malicious function such as
extracting a user's password or other data or erasing the hard disk), Intellectual Property
Crimes etc.
2. CRIME AGAINST ORGANIZATION
The third type of Cyber-crimes classification relate to Cybercrimes against organization i.e.
unauthorize access over the computer system of governments, firms, group of individuals etc.
Cyber Terrorism is one discrete kind of crime in this kind. This crime obvious itself into terrorism
when a human being "cracks" into a government or military maintained website.
3. CRIME AGAINST SOCIETY
The fourth type of Cyber-crimes relate to Cybercrimes against society. In this category forgery,
cyber terrorism, polluting the Youth through Indecent, Financial Crimes, Sale of Illegal Articles
etc.
• "Conventional crimes are those traditional, illegal behaviors that most people
think of as crime.
• Conventional crime includes murder, rape, assault, robbery, burglary and theft.
The concept of cybercrime is not radically different from the concept of conventional
crime. Both include conduct whether act or omission, which cause breach of rules of law
and counterbalanced by the sanction of the state.
However, there are certain differences between the two. It would be relevant to points
out these similarities and differences between the two.
profit.
Common Types of Cyber Criminals
1. Identity Thieves
Identity thieves are cyber criminals who try to gain access to their victims’ personal
information – name, address, phone number, place of employment, bank account, credit
card information and social security number. They use this information to make financial
transactions while impersonating their victims. Identity theft is one of the oldest
cybercrimes, gaining prominence during the early years of the Internet.
2. Internet Stalkers
Internet stalkers are individuals who maliciously monitor the online activity of their
victims to terrorize and/or acquire personal information. This form of cybercrime is
conducted through the use of social networking platforms and malware, which are able
to track an individual’s computer activity with very little detection. The motives for such
attacks can differ depending on the cybercriminal, but many internet stalkers seek to
acquire important information that they can use for bribery, slander, or both.
3. Phishing Scammers
Phishers are cyber criminals who attempt to get ahold of personal or sensitive
information through victims’ computers. This is often done via phishing websites that are
designed to copycat small-business, corporate or government websites.
4. Cyber Terrorists
a) Money
b) Entertainment
c) Political gains
d) Entrance into a social group
e) To maintain status in hacking community (competition)
Issues relating to Investigation in Cyber crimes