Last Updated on 3 years by Touhid
Cyber crime is any criminal activity which involves a computer and network in order to generate profit. There are different types of cyber crime in cyber space and it is one of the most profitable ways to make money in the criminal world.
Cyber crimes are carried out against computers or network directly to perform illegal activities such as steal information, damage data, spread malware, committing fraud, trafficking in child pornography etc.
Cyber crime uses different types of tools such as phishing, viruses, spyware, malware, ransomware, and social engineering to break the cyber law.
Different types of Cyber Crime
Nowadays, all digital devices such as computers, notebook, and smartphones are connected to the internet. Cyber crime uses different types of tools such as phishing, viruses, spyware, malware, ransomware, and social engineering to break the cyber law. Different types of cyber crime which are described as below.
A Hacker is a person who finds weakness and exploits the vulnerability in computer systems or network to gain access.
Hacking refers to activities that exploit a computer system or a network in order to gain unauthorized access or control over systems for illegal purpose.
Fraud is an intentionally action that intends to deceive a person in order to gain important data or information. It can be done by altering, destroying, stealing, or suppressing any information.
Identify theft is the most common type of fraud in which the process of stealing your personal information such as social security number, bank account, credit cards, debit cards, social security, and other sensitive information.
Phishing is a type of social engineering attack that attempt to gain sensitive and confidential information such as usernames, passwords, credit card information, network credentials, and so more. In a phishing attack, an attacker sends phishing emails to victims in order to steal of login credentials and account information.
Malware is short for “malicious software” that typically consists of software program or code. It is developed by cyber attackers which are designed to extensive damage to data and systems or to gain unauthorized access to a computer network.
The malware is delivered in the form of a link or file over email and it requires the user to click on the link or open the file to execute the malware. This type of attack includes computer viruses, worms, Trojan horses and spyware.
A Denial-of-Service or DoS attack is an attack that shut down a system and making it inaccessible to the users. It occurs when an attacker prevents legitimate users from accessing specific computer systems, devices or other resources.
In addition, DoS attack typically flooding a targeted system with requests until normal traffic is unable to be processed, resulting in denial-of-service to users.
Zero day attack is the application based computer security threats which is unknown security vulnerability in a computer software or application. It is either patch has not been released or the application developers were unaware of or did not have sufficient time to fix the vulnerability.
However, if the vulnerability is not solved by the developer then it can effect on computer programs, data, or a network.
SQL injection is one of the most common web hacking techniques that allows attacker to control an application’s database to change or delete data.
It is the placement of malicious code in SQL statements, via web page input. This types of attack occur when an application fails to properly sanitize the SQL statements then attacker can include their own malicious SQL commands to access the database.
Cross Site Scripting (XSS)
Cross-site scripting also known as XSS is a web security vulnerability and client-side code injection attack. XSS allows when an attacker aims to execute malicious scripts in a web browser of the victim to including malicious code in a legitimate web page or application.
So, the actual attack occurs when the victim visits the untrusted web page or application that executes the malicious code.
Spoofing is a type of threat where an attacker attempts to gain unauthorized access to a user’s system or information by pretending to be the user. The most common forms spoofing are IP spoofing, email spoofing, and DNS spoofing.
Its main purpose is to spread malware, stealing user’s sensitive information such as bank account details, personal information, login credentials, credit card details etc.
Cyberstalking is technological harassment in which refers to the crime of using the Internet, email, or other types of electronic communications to stalk, harass, or threaten to a targeted user.
It involves sending harassing emails, text messages, social media posts, tracking apps, monitoring movements using GPS or creating websites for the sole purpose of tormenting the victim.
Data Diddling is unauthorized process where the attacker altering data before or during entry into a computer system. In this technique, the attacker can modify the expected output and which is difficult to track.
Social engineering is a type of cyber-attack in which cyber criminals make a direct contact with victim through phone calls, emails, or even in person. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
These attacks take advantage of human weakness and vulnerabilities such as their emotions, easy mindless and trust in order to convince individuals to take action such as clicking a deceptive link or visiting a malicious website.
Ransomware is a type of malicious software or program that blocks to access computer system and demands for bitcoin in order to access the system. The most dangerous ransomware attacks are WannaCry, Petya, Cerber, Locky and CryptoLocker etc.
Above all types of attack typically installed in a computer system through the following ways:
- When download and open a malicious email attachment
- Install an infected software or apps
- User visit a malicious website or link
- Click on untrusted web link or images
Cybersquatting is a criminal offense related to website domains which registering, selling or using a domain name with bad-faith intent to profit. When a cyber-squatter buys a domain, it is inaccessible and states the site is under construction, uses it to advertise, or has information about how to buy the domain.
It is also known as domain squatting.