Hacking is commonly referred as unauthorized access to
computer systems or network without the permission of
the computer owner/user
Hackers write or use ready-made computer programs to
attack the target computer
Computer hacking includes breaking into a computer with
the intent to steal, damage or modify the data within the
Malicious software that attaches itself to other software
Circulate themselves to other files and to other computers on
Affect the data on a computer, either by altering or deleting it
THEFT In such crime criminal makes
insignificant changes in such a
manner that such changes
would go unnoticed
Criminals makes such program
that deducts small amount like
Rs. 2.50 per month from the
account of all the customer of
the bank and deposit the same
in his account. In this case no
account holder will approach
the bank for such small amount
but criminal gains huge amount
Theft of software through the illegal copying of genuine
programs and distribution of products intended to pass for the
Copying and using computer programs in violation of
copyrights and trade secret laws
Retail revenue losses worldwide are ever increasing due to this
It refers to sending large numbers of mail to the victim, which
may be an individual or a company by ultimately resulting into
E-mail "bombing" is characterized by abusers repeatedly
sending an identical email message to a particular address
It is the actual use of computers
and Internet technology to cause
intimidation and destruction
Uses the Internet or network to
destroy computers for political
Cyber terrorist could hack into a
computers, changing the formula
of some essential medication
and causing thousands to die.
Misuse of other people’s passwords.
Break a company’s password and misuse the password or sale
that password to another company or an individual.
Identity theft occurs when
somebody steals a personal name
and other personal information for
Identity theft is a form of identity
crime where somebody uses a
false identity to commit a crime
It involves stealing victims’
personal information and
credentials, often to make
Phishing involves fraudulently
acquiring sensitive information
(e.g. passwords, credit card
details etc.) by masquerading
as a trusted entity.
CREDIT CARD FRAUD
If electronic transaction are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
Safety Tips to Cyber Crime
Use antivirus software’s.
Check security settings.
Never give your full name or e-mail address to strangers.
Don't respond to harassing or negative messages (flames).
Get out of uncomfortable or hostile situations quickly .
Save offending messages.
Learn more about Internet privacy.