• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية IT Law IT Tutorials What is Cyber Crime and What are the types?

What is Cyber Crime and What are the types?

الكاتب ahmed في 12:36 AM IT Law IT Tutorials

What is Cyber Crime
Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. These could be either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber crimes.

Because of the anonymous nature of Internet , it is possible to engage in a variety of criminal activities with impunity, and people with intelligence, have been grossly misusing this aspect of the Internet to commit criminal activities in Cyberspace.

The field of the Cyber crime is just emerging and new forms of criminal activities in Cyberspace are coming to the forefront each day. For example, child pornography on Internet constitutes on serious cyber crime. Similarly, online pedophiles, using Internet to minor children into sex, are as much cyber criminals as any others.



There are basically Three major categories of Cyber crimes which are:

  1. Cyber Crimes against persons: Cyber crimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer and cyber stalking. The trafficking, distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes on of the most important cyber crimes today. Similarly, Cyber harassment is a distinct cyber crime. Various kind s of harassment's can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious or of any other nature.
  2. Cyber crime against property: The second category of Cyber crimes is Cyber crimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs and unauthorized possession of computerized information.
  3. Cyber crimes against Government: Third category of Cyber crimes is Cyber crimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of cyberspace is being used by individuals and groups of threaten international governments as also to terrorize the citizens of a country. This crime manifests itself into Cyber Terrorism when and individual "cracks" into a government or military maintained website, for the purpose of perpetuating terror.


 You may also wanted to view the following related posts



  • What is Cyber-law?
  • What is Cyber Crime and What are the types?
  • What is intellectual property law?
  • What is literal and non-literal copying of computer programs?
  • Defining e-commerce
  • Classification of E-commerce by transaction partners
  • Definition of E-Government
  • Challenges and Opportunities for Developing a Successful E-Government
  • Factors Affecting the Success of E-Government

شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • 8 طرق طبيعية فعالة لعلاج حب الشباب
    حب الشباب يعد من اكثر الاشياء المزعجة التي يعاني منها الكثير من الناس  وفي هذا الموضوع سنتناول افضل الطرق الطبيعية للتخلص من حب ...
  • Best 10 ways of making money online
    Best 10 ways of making money online
    Making money online is not easy task if you don't know about the best and easy ways for that. Since, Internet is itself a virtual world,...
  • Top 10 List Of Stock Photography Sites To Earn Online
    I have already posted that, through stock photography sites you can earn online by sharing your original stocked photographs. You should po...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • List of sites to create shortcut URL for your bog or site
    V3.com URL Forwarding: url or domain forwarding (also called 'redirect') transfers your traffic from your V3 Sub Domain to another ...
  • SQL MCQ Interview Questions With Answers set-3
    1. In SQL , which command is used to remove a stored function from the database? Cover of SQL Server magazine (Photo credit: Wikipedia ) A) ...
  • How to Create Oracle Forms by Using Wizard ?
    How to Create Oracle Forms by Using Wizard ?
    Oracle Forms is a technology developed by Oracle to develop database driven web applications quickly and easily. It is a component of Oracle...
  • Solved MCQ on Physical Layer in OSI Reference Model set-1
    1) Which of the following is/are the applications of twisted pair cables ...... A. In the local loop B. In the DSL line C. In the ISDN Netwo...
  • MCQ on c++ Programming with Answers set-6
    1. If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can a...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ▼  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ►  April (13)
    • ▼  March (23)
      • Best 10 ways of making money online
      • List of top 7 Free bulk search engine submission t...
      • Solved Objective Questions of Computer Fundamental...
      • How to earn online from Top revenue sharing sites?
      • What is literal and non-literal copying of compute...
      • Solved Objective Questions of System Analysis and ...
      • MCQ of System Analysis and Design with answer set-4
      • Top 10 article writing tips for blogger.
      • What is the scope of computer science or IT study?
      • What is intellectual property law?
      • What is Cyber Crime and What are the types?
      • What is Cyber-law?
      • MCQ of Software Engineering with answer Set-2
      • Solved MCQ of Software Engineering Set-1
      • MCQ of Artificial Intelligence (AI) with answer Set-2
      • Solved MCQ of Database Management System (DBMS) Se...
      • MCQ of Visual Basic dot net (VB.Net) with answer s...
      • Solved MCQs of Visual Basic.Net set-1
      • What are the technical limitations of twitter acco...
      • How to prevent your twitter account from being sus...
      • MCQ of Database Management System(DBMS) with answe...
      • List of bad ways for building backlinks
      • Solved MCQ for Computer Officer Exam part-1
    • ►  February (6)
    • ►  January (17)
  • ►  2012 (59)
    • ►  December (15)
    • ►  November (20)
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة