By: 
ZEESHAN ALAM KHAN 
(MCA AMU)
 Distinguishing Cybercrimes from Cyber related 
Crimes
Cyber Piracy 
Using cyber-technology in unauthorized ways to reproduce copies of 
proprietary software and proprietary information or distribute proprietary 
information across a computer network. 
Cyber Trespass 
Using cyber-technology to gain unauthorized access to an individual's or 
an organization's computer system or a password-protectedWeb site.
Cyber Vandalism 
Using cyber-technology to unleash one or more 
programs that disrupt the transmission of electronic 
information across one or more computer networks, 
including the Internet or destroy data resident in a 
computer or damage a computer system's 
resources or both.
Hacking means unauthorized attempts to bypass the security 
mechanisms of an information system or network. Also, in 
simple words Hacking is the unauthorized access to a 
computer system, programs, data and network resources. The 
person whose identity is used can suffer various consequences 
when they are held responsible for the perpetrator’s actions
E-mail bombing refers to sending a large amount of e-mails to 
the victim resulting in interruption in the victims’ e-mail account 
or mail servers. 
Data Diddling 
This kind of an attack involves altering the raw data just before 
it is processed by a computer and then changing it back after 
the processing is completed.
Cyber Stalking is use of the Internet or other electronic means to 
stalk someone. This term is used interchangeably with online 
harassment and online abuse. Stalking generally involves 
harassing or threatening behaviour that an individual engages in 
repeatedly, such as following a person, appearing at a person's 
home or place of business, making harassing phone calls, 
leaving written messages or objects, or vandalizing a person's 
property.
E-mail spoofing is e-mail activity in which the sender addresses 
and other parts of the e-mail header are altered to appear as 
though the e-mail originated from a different source. E-mail 
spoofing is sending an e-mail to another person in such a way 
that it appears that the e-mail was sent by someone else 
Denial Of Service 
This involves flooding computer resources with more requests 
than it can handle. This causes the resources to crash thereby 
denying authorized users the service offered by the resources.
Identity theft is a form of fraud or cheating of another person’s 
identity in which someone pretends to be someone else by 
assuming that person’s identity, typically in order to access 
resources or obtain credit and other benefits in that person’s 
name. 
Salami Attacks 
These attacks are used for the commission of financial crimes. 
The key here is to make the alteration so insignificant that in a 
single case it would go completely unnoticed e.g. a bank 
employee inserts a program into bank’s servers, that deducts a 
small amount from the account of every customer
⇛ Many crimes that involve the use of cyber-technology are not genuine 
cyber crimes. 
⇛ Crimes involving stalking can each be carried with or without the use 
of cyber technology. 
⇛ Hence, there is nothing about these kinds of crimes that is unique to 
cyber technology. 
⇛ These and similar crimes are better understood as instances of cyber 
related crimes.
Cyber crime
Cyber crime

Cyber crime

  • 1.
    By: ZEESHAN ALAMKHAN (MCA AMU)
  • 2.
     Distinguishing Cybercrimesfrom Cyber related Crimes
  • 4.
    Cyber Piracy Usingcyber-technology in unauthorized ways to reproduce copies of proprietary software and proprietary information or distribute proprietary information across a computer network. Cyber Trespass Using cyber-technology to gain unauthorized access to an individual's or an organization's computer system or a password-protectedWeb site.
  • 5.
    Cyber Vandalism Usingcyber-technology to unleash one or more programs that disrupt the transmission of electronic information across one or more computer networks, including the Internet or destroy data resident in a computer or damage a computer system's resources or both.
  • 6.
    Hacking means unauthorizedattempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions
  • 7.
    E-mail bombing refersto sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers. Data Diddling This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 8.
    Cyber Stalking isuse of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 9.
    E-mail spoofing ise-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else Denial Of Service This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.
  • 10.
    Identity theft isa form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. Salami Attacks These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. a bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer
  • 11.
    ⇛ Many crimesthat involve the use of cyber-technology are not genuine cyber crimes. ⇛ Crimes involving stalking can each be carried with or without the use of cyber technology. ⇛ Hence, there is nothing about these kinds of crimes that is unique to cyber technology. ⇛ These and similar crimes are better understood as instances of cyber related crimes.