top of page
Writer's pictureMr. Sharad Dhage, India

Cyber crimes to know in 2021

Introduction:

With our world moving towards digitization, the occurrences of cyber crimes on systems can be highly damaging. As technology progresses and more people depend on the internet-abled services for every day activities, including storing their credit card details and transacting money online, cyber crimes are becoming more common than ever. The consequences of these digital attacks are destructive and can cause some serious damages.

What is Cyber Crime?

One of the most popular and oft-occurring forms of crime in the world, cyber crime can be defined as the exploitation of computer networks, systems, and technology-dependent enterprises intentionally. There are different types of cyber crimes that use malicious code to modify data and gain unauthorized access.

What are the Categories of Cyber Crime?

Cyber crimes are categorized into three broad categories, individual, property and government. Based on each category of cyber crime, cybercriminals use different levels and types of threats.

Individual: This cyber crime category includes disseminating malicious or illegal information via the internet and digital-applications by one person. Cyber speaking, pornography distribution, and trafficking are a few examples of this category of cyber crime.

Property: This cyber crime is similar to a real-life incident where a criminal keeps the bank or credit card information illegally. The hacker steals an individual’s bank details to acquire money or makes phishing scams online to obtain information from people.

Government: It is the least frequent cyber crime, but it is the most serious misconduct. A cyber crime against the government is also regarded as Cyber Terrorism. Government cyber crime involves the hacking of websites, military websites, or the distribution of government propaganda.


What are the Common Types of Cyber Crimes?

Let’s explore various types of cyber crimes prevalent today.

1. Web Attacks

2. SQL Injections

3. Cross-Site Scripting

4. DDoS Attacks

5. Password Attacks

6. Eavesdropping Attacks

7. Brute-Force and Dictionary Network Attacks

8. Insider Threats

9. Man-in-The-Middle Attacks

10. AI-powered Attacks

11. Drive-by Attacks

12. Phishing Attacks

13. Spear Phishing Attacks

14. Whale Phishing Attacks

15. Malware

16. Ransomware

17. Trojan Horses

18. Teardrop Attack

19. Ping of Death Attack

20. PuP’s

5 views0 comments

Comments


bottom of page