INTRODUCTION
It’s an unlawful act wherein the computer is either a tool or a target or both any illegal act involving a computer, its systems, or its applications” .The crime must be intentional and not accidental.131.2 million Is the number of cybercrime victims in India in 2019, compared with 350 million worldwide.
1.24 trillion Is the amount lost in India in the past 12 months due to cybercrime. 4 in 10 consumers in India have experienced identity theft, with 10% impacted in the past year. Highest numbers of cybercrime cases were registered in Karnataka (12,020) .The NCRB's data stated that 44,546 cases of cybercrimes were registered in 2019 as compared to 28,248 in 2018
Classification of Cyber Crime
cyber crimes against individuals
cyber crimes against organizations
cyber crimes against society at large
1. Cyber crimes against individuals
Cybercrimes committed against persons include various crimes like transmission of child pornography, harassment using e-mails and cyber-stalking. Posting and distributing obscene material is one of the most important Cybercrimes known today.
2. Cyber crimes against organizations
One of the distinct cybercrimes against government and related organizations is cyber terrorism. The individuals and groups use electronic media and the cyberspace to threaten the international governments and the citizens of a country. This crime manifests itself into terrorism when an government or military websites are hacked and vital information is retrieved. Cybercrime against organization and society mainly includes unauthorized access of computer, password sniffing, denial of service attacks, malware attacks, crimes emanating from usenet group, industrial spying/espionage, network intrusions, forgery, web-jacking etc.
3. Cyber crimes against society at large
This list combines crimes having adverse effects on the society directly or indirectly:
Finance related crimes
Forgery
Indecent exposure
Online Gambling
Sales of illegal articles
Trafficking
Hacking
Defined as unauthorized access to anyone’s information system. It could be access to their computer systems, mobile devices or personal account.The Term "Hacking" in information security refers to exploiting the vulnerabilities in a system, compromising the security to gain unauthorized command and control over the system resources. Purpose of hacking may include modification of system resources, disruption of features and services to achieve goals. It can also be used to steal information for any use like sending it to competitors, regulatory bodies or publicizing the sensitive information.
TYPES OF HACKERS
Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as well. Black hat hacking is illegal.
White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system. They focus on security and protecting IT system. White hat hacking is legal.
Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system. In most cases, they tell the administrator of that system. But they are also illegal because they test the security of the system that they do not have permission to test. Grey hat hacking is sometimes acted legally and sometimes not.
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Elite HackersThis is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialofservice attacks.
Wait for the next part for procedure to hacking
Comments