Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views12 pages

Cyber Security

The document outlines various types of cybercrime, including hacking, phishing, smishing, spoofing, online banking fraud, software piracy, crypto scams, cyberstalking, digital arrest scams, and identity theft. It highlights the methods used by cybercriminals to exploit victims and the legal repercussions for such activities under relevant laws. Additionally, it emphasizes the importance of awareness and safe practices in online transactions to prevent falling victim to these crimes.

Uploaded by

kashyapayansh63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views12 pages

Cyber Security

The document outlines various types of cybercrime, including hacking, phishing, smishing, spoofing, online banking fraud, software piracy, crypto scams, cyberstalking, digital arrest scams, and identity theft. It highlights the methods used by cybercriminals to exploit victims and the legal repercussions for such activities under relevant laws. Additionally, it emphasizes the importance of awareness and safe practices in online transactions to prevent falling victim to these crimes.

Uploaded by

kashyapayansh63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cybercrime is any criminal

activity that involves a


computer, network or
networked device.
HACKING
• This term refers to the crime of unauthorized access
to private computers or networks and misuse of it
either by shutting it down or tampering with the
data stored or other illegal approaches.
PHISHING
• Phishing is a type of cybercrime in which attackers use
fake emails, texts, or messages to trick victims into
revealing sensitive information such as passwords,
credit card numbers, or personal identification
numbers.
• Section 419 of the IPC now Section 319 of the BNS
• Under Section 66D of the IT Act, The legal provision imposes a
penalty of imprisonment for up to three years or a fine of up
to Rs 1 lakh or both
SMISHING
• Smishing is a social engineering attack that uses fake mobile
text messages to trick people into downloading malware,
sharing sensitive information or sending money to
cybercriminals. The term “smishing” is a combination of
“SMS”—or “short message service,” the technology behind
text messages—and “phishing.”
According to Proofpoint’s 2024 State of the Phish report, 75%
of organizations experienced smishing attacks in
2023.1
SPOOFING
• Spoofing is a type of scam in which a criminal disguises an email address,
display name, phone number, text message, or website URL to convince a
target that they are interacting with a known, trusted source. Spoofing
often involves changing just one letter, number, or symbol of the
communication so that it looks valid at a quick glance.



Card Skimming
• Money Transfer Fraud Malware and Viruses.
• Loan Fraud Lottery/Gift Fraud
Types of Online Banking Frauds:
Online Banking Fraud or internet fraud refers to schemes in which fraud is
committed with the help of online transactions. Prime reason - majority of
people who use online banking are unaware of safe practices to be
followed during online transactions.
FRAUD
ONLINE BANKING
SOFTWARE PIRACY

• Software Piracy is the illegal approach of copying, distributing, modifying, selling, or using software that
is legally protected. So in a simple term, we can say Software piracy is the act of stealing legal
software. This software piracy refers to the unauthorized copy and use of legal software and now this
critical problem has turned into a global issue.
CRYPTO SCAM
• Crypto scams refer to any fraudulent practice in the cryptocurrency space aimed at
tricking individuals into investing or giving away assets or sensitive information.
It encompasses many fraudulent schemes, including fake initial coin offerings
(ICOs), Ponzi schemes, phishing attacks, pump-and-dump schemes, fake
cryptocurrency exchanges, and fraudulent investment schemes promising
unrealistic returns.
STALKING
• Cyberstalking is when a cybercriminal uses email, direct
messaging, or other electronic means to harass, scare, or
threaten someone with physical harm. It takes different
forms, including: Tracking someone's online activity or
physical location. Stealing someone's identity for financial
gain.
DIGITAL ARREST
• A digital arrest scam is an online scam that defrauds victims of
their hard-earned money. The scammers intimidate the
victims and falsely accuse them of illegal activities. They
later demand money and puts them under pressure for
making the payment.
IDENTITY THEFT

You might also like