• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية IT Law IT Tutorials What is Cyber Crime and What are the types?

What is Cyber Crime and What are the types?

الكاتب ahmed في 12:36 AM IT Law IT Tutorials

What is Cyber Crime
Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. These could be either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber crimes.

Because of the anonymous nature of Internet , it is possible to engage in a variety of criminal activities with impunity, and people with intelligence, have been grossly misusing this aspect of the Internet to commit criminal activities in Cyberspace.

The field of the Cyber crime is just emerging and new forms of criminal activities in Cyberspace are coming to the forefront each day. For example, child pornography on Internet constitutes on serious cyber crime. Similarly, online pedophiles, using Internet to minor children into sex, are as much cyber criminals as any others.



There are basically Three major categories of Cyber crimes which are:

  1. Cyber Crimes against persons: Cyber crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer and cyber stalking. The trafficking, distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes on of the most important cyber crimes today. Similarly, Cyber harassment is a distinct cyber crime. Various kind s of harassment's can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious or of any other nature.
  2. Cyber crime against property: The second category of Cyber crimes is Cyber crimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs and unauthorized possession of computerized information.
  3. Cyber crimes against Government: Third category of Cyber crimes is Cyber crimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of cyberspace is being used by individuals and groups of threaten international governments as also to terrorize the citizens of a country. This crime manifests itself into Cyber Terrorism when and individual "cracks" into a government or military maintained website, for the purpose of perpetuating terror.


 You may also wanted to view the following related posts



  • What is Cyber-law?
  • What is Cyber Crime and What are the types?
  • What is intellectual property law?
  • What is literal and non-literal copying of computer programs?
  • Defining e-commerce
  • Classification of E-commerce by transaction partners
  • Definition of E-Government
  • Challenges and Opportunities for Developing a Successful E-Government
  • Factors Affecting the Success of E-Government

شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • What is Information ?
    Information  can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived valu...
  • What is Information Technology?
    Definitions of  Information technology  ( IT ) It is a branch of engineering dealing with the use of computers and telecommunications equipm...
  • بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017 لن تصدق من هي فرح صدقي ↓↓  لمشاهدة الصور والخبر كامل اضغط هنا  ↓↓ رابط المو...
  • Interview Questions on Stack and Queue in Data Structure set-2
    1) The queue in which the insertion takes place in the first position after of last element is a ...... A. priority B. dequeue C. circular D...
  • List of Top 65 Search Engine Submission Add URLs.
    List of Top 65 Search Engine Submission Add URLs.
    To get your site on the top ranking on the search engine results, Your site or URL must be indexed by Search Engines. For that you have to s...
  • List of Best Keyword Research Tools for Better SEO
    List of Best Keyword Research Tools for Better SEO
    Everyone needs to do keyword research work for the site before starting search engine optimization work as the first and most essential tas...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • Solved MCQ on Distributed Database Transaction Management set-4
    1) Commit and rollback are related to .......... A. data integrity B. data consistency C. data sharing D. data security 2) The transaction w...
  • Solved MCQ on Fundamental of DBMS set-10
    1) Which of the following is not a characteristic of a relational database model? A. Table B. Tree like structure C. Complex logical relatio...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ▼  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ►  April (13)
    • ▼  March (23)
      • Best 10 ways of making money online
      • List of top 7 Free bulk search engine submission t...
      • Solved Objective Questions of Computer Fundamental...
      • How to earn online from Top revenue sharing sites?
      • What is literal and non-literal copying of compute...
      • Solved Objective Questions of System Analysis and ...
      • MCQ of System Analysis and Design with answer set-4
      • Top 10 article writing tips for blogger.
      • What is the scope of computer science or IT study?
      • What is intellectual property law?
      • What is Cyber Crime and What are the types?
      • What is Cyber-law?
      • MCQ of Software Engineering with answer Set-2
      • Solved MCQ of Software Engineering Set-1
      • MCQ of Artificial Intelligence (AI) with answer Set-2
      • Solved MCQ of Database Management System (DBMS) Se...
      • MCQ of Visual Basic dot net (VB.Net) with answer s...
      • Solved MCQs of Visual Basic.Net set-1
      • What are the technical limitations of twitter acco...
      • How to prevent your twitter account from being sus...
      • MCQ of Database Management System(DBMS) with answe...
      • List of bad ways for building backlinks
      • Solved MCQ for Computer Officer Exam part-1
    • ►  February (6)
    • ►  January (17)
  • ►  2012 (59)
    • ►  December (15)
    • ►  November (20)
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة