1.
Cyber
Definition:
"Cyber" is a prefix used to describe anything related to computers, digital technology,
or the internet.
-The word "cyber" is often used in combination with other terms to describe activities
or things connected to the digital world.
Example: Cybersecurity means protecting computer systems and networks from
attacks or unauthorized access.
-Another example is cyberbullying, which refers to bullying someone through
messages, social media, or emails.
2. Crime
Definition:
A crime is any action that breaks the law and can be punished by the government.
-Crimes are actions that harm individuals, property, or society and are considered
illegal.
Example: Stealing a car, committing fraud, or physically attacking someone are all
examples of crimes.
People who commit crimes may be arrested, fined, or sent to jail.
3. Cybercrime
Definition:
Cybercrime is any illegal activity that involves a computer, digital system, or the
internet.
-Cybercrime uses technology to commit illegal actions. This can include hacking into
someone’s email, stealing personal information, or spreading viruses.
Example 1: A hacker breaking into a bank’s computer system to steal money.
Example 2: Creating fake websites to trick people into giving up their credit card
information (a type of scam known as phishing).
Example 3: Distributing pirated movies or software online.
4. Cyberspace
Definition:
Cyberspace is the online or digital world created by computer networks where people
can communicate, share data, and interact virtually.
-Cyberspace is not a physical space you can touch—it's the environment you enter
when you go online. It includes websites, social media, emails, online games, and
more.
Example: When you log in to Facebook, visit Google, or chat on WhatsApp, you are
using cyberspace.
-It’s also where cybercrimes, like hacking or online scams, can happen.
CATEGORIES OF CYBER CRIME
1. Cybercrime Against Individuals
Description:
These crimes directly target people and often involve stealing personal information or
causing emotional harm.
Examples:
Cyberbullying: Harassing or threatening someone online.
Identity Theft: Stealing someone's personal data (e.g., name, bank info) to commit
fraud.
Phishing: Sending fake emails to trick people into giving sensitive information.
Online Scams and Fraud: Fake lotteries, job offers, or romance scams.
2. Cybercrime Against Property
Description:
These crimes involve attacks on digital property such as data, files, websites, or
devices.
Examples:
Hacking: Gaining unauthorized access to someone’s computer or network.
Spreading Malware or Viruses: Infecting devices with software that damages or
steals data.
Denial-of-Service (DoS) Attacks: Overloading a website to make it unavailable.
Website Defacement: Illegally changing the appearance or content of a website.
3. Cybercrime Against Organizations or Governments
Description:
Crimes that target institutions, public services, or national security systems.
Examples:
Cyberterrorism: Using the internet to threaten national security (e.g., hacking
government systems).
Corporate Espionage: Stealing trade secrets or confidential data from a company.
Cyberwarfare: Nation-state attacks on other countries’ digital infrastructure.
Ransomware Attacks: Locking important data until a ransom is paid.
4. Cybercrime Against Society
Description:
These crimes affect the public, culture, or moral values of a society.
Examples:
Spreading Fake News or Misinformation: Deliberately sharing false info to mislead
people.
Distributing Illegal or Harmful Content: Sharing child pornography, hate speech,
or extremist materials.
Drug or Weapon Trafficking via the Dark Web: Using the internet to sell banned
goods.
TYPES OF CYBER CRIMINAL
1. Hackers
Description: Individuals who break into computer systems or networks.
Black Hat Hackers – Malicious hackers (commit crimes).
White Hat Hackers – Ethical hackers (help secure systems).
Grey Hat Hackers – In-between (break rules but not for harm).
2. Crackers
Description: Cyber criminals who break security codes to access or distribute illegal
software.
3. Cyber Terrorists
Description: Use the internet to conduct terror attacks, threaten national security, or
spread fear.
Example: Hacking government websites or infrastructure to cause panic.
4. Cyber Stalkers
Description: Use digital platforms to harass, monitor, or intimidate someone
continuously.
Example: Repeatedly sending threatening messages or tracking someone's location
online.
5. Scammers / Fraudsters
Description: Trick people into giving money or sensitive information.
Example: Phishing emails pretending to be from banks or online services.
6. Identity Thieves
Description: Steal and use someone else's personal data for fraud.
Example: Using stolen information to open bank accounts or make purchases.
7. Spammers
Description: Send large volumes of unsolicited messages, often with malicious links.
Example: Fake emails about winning a lottery or free gifts to trick users.
8. Insiders (Disgruntled Employees)
Description: Employees or former staff who misuse internal access to steal or destroy
information.
Example: An employee leaking confidential company data after being fired.
9. Script Kiddies
Description: Inexperienced individuals who use existing tools or scripts to launch
attacks, without deep technical knowledge.
Example: Downloading a hacking tool to crash websites just for fun.
10. State-sponsored Hackers
Description: Hackers working for a government to perform espionage or cyberattacks
against other nations.
Example: Stealing military secrets or interfering in another country’s elections.