Types of Cyber Crimes

  1.  Individual- examples include cyber stalking, and distributing pornography
  2.  Property- examples include stealing of bank information, damage of software and/or hardware
  3.  Government- examples include any type of Cyber Terrorism, extortion, stock market manipulation


When a person's computer is broken into so that personal or sensitive information can be accessed. Files can be gained,copied,altered or even deleted.When a computer's system is taken over by another computer to commit Cyber Crimes this computer is called a Zombie. A Trojan Horse virus is a common way this is done. Hackers send out (DOS) attacks using zombie computers to widely spread email, spam, and malware to other systems. Phishing is another example of hacking. This normally involves the victim or target receiving a supposedly legitimate email that has a link which when opened leads to a hostile website which can then infect the PC with a virus. 

What is this

This is when a person violates copyrights and downloads music, movies, games and software. Piracy is another name for this. The person takes the source material and removes any protection the data might have then passed the unprotected results onto file sharing networks and distribution sites. Another form of theft is Transaction Fraud. This is when someone offers an item(s) on an auction site or such with no intent to delivery the goods once the payment is received.

Cyber stalking:

This form of Cyber Crime is when online harassment takes place. The victim is subjected to a barrage of online messages and emails. These messages might only be seen by the victim or they may be made public, such as posting negative things onto social media sites. Some examples of this are: online bullying, blackmail, and stalking.

Identity Theft:

This is when a criminal accesses data about a person's bank account, credit cards, social security, debit card and other sensitive information. Most commonly the victims that fall prey for this are those conducting business online and those using the internet to pay bills. Once the information is stolen the criminal could then use the info to steal money from accounts, make purchases, or even get false credit cards for themselves.

Child Soliciting and Abuse:

Criminals solicit minors via chat rooms for the purposes of possibly meeting and engaging in sexual acts which is child luring. They also use chat rooms for the purpose of child pornography. Distributing photographs, videos or anything sexual involving a minor is considered illegal.