A
What is Cyber crime in India and what are its types?
As the name suggests, cyber crime is defined as an unlawful act, wherein the computer is either a tool or a target or both to commit criminal activities. The different types of cyber crime in India include:
Types of Cyber crimes in India:
- Crypto jacking: In this type of cyber-attack the criminal secretly uses the victim’s computing power to generate cryptocurrency. Ex: Over 2000 computers at Aditya Birla Group were attacked by hackers for mining cryptos[1]
- Cyber Terrorism: Cyber Terrorism also known as Digital Terrorism is committed with an intent to threaten the sovereignty, integrity of the country or cause a sense of fear amongst the people by disrupting the information system, data or programs.
- Hacking or Damage to computer system: This refers to the misuse of devices to cause damage or corrupt systems in order to gather information, steal data without authorization.[2]
- Phishing: It is a type of cyberattack, where the attackers try to impersonate links, sources and deceive people to believe those messages, emails to be real and lure them to disclose sensitive information such as username, passwords etc.,.
- Ransomware: It is a type of cyberattack where the attackers block the user access of data stored in devices until the demanded ransom amount is paid. Ex: Recently cyber attackers in initiated a ransomware attack on a Bangalore based firm and demanded a ransom amount of USD 80,000 (Approx. INR 66.70 Lakhs) from the firm, failing which the data would be sold on dark web.[3]
- Child Pornography/Child Sexual Abuse Material: Sharing, publishing or transmitting of material depicting children in sexually explicit act, images etc., in any electronic form is a punishable offence under section 67B of IT Act 2000.
- Trojan Horse: A Trojan Horse is a type of virus that is installed in devices through links, advertisements, messages by the attacker, these links, advertisements, messages appear genuine and harmless but contain malware, once the virus is installed the attacker gets access to confidential information, passwords etc.