We all might be quite familiar with the term cyber attacks and may have come across it numerous times in our daily life. To make it clear, cybercrime can be understood as a crime in which a computer is the object of the offense (hacking, phishing, spamming) or is used as a tool to commit a crime (child pornography, hate crimes). Cybercriminals may use information technology to access personal information, business trade secrets or use the internet for corrupt or venomous purposes. Criminals can also use computers for communication and documentation or data storage.
Having known what cyber crime is we can now take a look at some major examples from the past to get a much clear picture of the offense.
Hacking is an effort to exploit a computer network or a personal system inside a computer. In simpler terms, it is the unapproved entrance to or control over computer network security systems for some illegitimate motives. For example, The Mirai Botnet attack which took place in October of 2016, the deadliest DDoS offense ever was initiated on service provider Dyn having used an IoT botnet. This caused large proportions of the internet crashing, inclusive of Twitter, the Guardian, Netflix, Reddit, and CNN. This IoT botnet was actually put into action by a malware called Mirai. Once damaged with Mirai, computers constantly browse the internet for unprotected IoT mechanisms and then use known default usernames and passwords to log in, infecting them with malware.
Phishing is a type of deception in which a criminal dissimulates as an esteemed body or person in email or other communication network. The offender uses phishing emails to issue hostile links or attachments that can carry out a variety of tasks, including the extraction of login credentials or account information from targeted users.
As we can understand by the name itself, ransomware involves the use of ‘ransom’ to carry out the practices it requires. Ransom refers to the sum of money demanded or paid for the release of a captive. Similarly, ransomware is a subdivision of a virus in which the information on a targeted user’s computer is locked, usually by encryption, and payment is demanded before the ransomed data is decrypted and extra returned to the victim.
Phishing lures targeted users through false emails to get them to visit false sites and reveal their personal data. Pharming is a form of phishing, but without the attraction. A hacker penetrates a computer network and installs a venomous code that causes website traffic from the system to be transferred to false sites made by the hacker. This is done without the victim’s knowledge or consent.
Cyberstalking is stalking that occurs using electronic mechanism or the internet. It is the technological harassment which targets a particular person or individual. There are several forms of cyberstalking. For example, placing orders for delivery using a fake name or someone else’s name (which is also illegal), collecting confidential data of the user spreading false rumors, etc.