Digital Forensics: What is Cybercrime and its Different Types

Cybercrime is any illegal activity that is performed by the use of a connected device such as a computer, laptop, mobile, etc. This blog illustrates different types of cybercrime and also mentions its examples.

Different Types of Cybercrime

Internal Attack

When a cyber-attack is performed by an internal entity of an organization. e.g. deletion of the base code of the company's website by a disgruntled employee of that organization

External Attack

When a cyber attack is performed by an external entity by exploiting vulnerabilities in the IT system. e.g. defacement of the website by exploiting web-based vulnerabilities

Examples of Cybercrimes

ExampleDescription
CyberwarfareTry to get the secrets of an individual organization or nation from an attacker
Phishing/SpoofingClone the existing IT system/website to trick genuine users
EspionageData is deleted, updated, and viewed by an unauthorised entity
CyberterrorismTry all the combinations of strings to crack the secret of any IT system
Brute-force AttackUse of cyber tools by terrorists against entity/organisation
Cyber DefamationDefame the entity by using Internet technologies
Data ManipulationSoftware turned into malware that is used by an employee
Intellectual Property TheftIntellectual Property owned by an organization stolen by an attacker
Denial of Service AttackBombard IT system with useless requests to prevent access of genuine users
Trojan Horse AttackThe software turned into malware that is used by an employee

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

10 Blockchain Security Vulnerabilities OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues