Learning the different types of Cyber Crime

Learning the different types of Cyber Crime


As we are in the constant race in growing the economy and to struggle with other advanced countries.[i] In this race the development of technology has a larger influence in the developing world to fight with other countries, technologies like computers, email, the internet were the largest growth in the corporate sector and government job as it was clear and restraint to transfer data and different cause of medium.[ii] As an increase in technologies which is so radicle that not only transform the way that community associates, it also has a significant impact on the performance of criminal component within the community.

As the computer system and Internet has appeared in the 21st Century, the world moves towards the digitalization and as its extreme impact, the cybercrime has developed,[iii] the first-ever cybercrime were performed before the internet evolved into the present which includes the stealing of data and other several kinds of cybercrime have developed. The cyber thief normally hacks the system and oozes the required data which would create a tremendous loss to the company. There are some precautionary steps to evade cyber theft and due to an expansion in the amount of the cybercrime act was inserted below the “IT Act, 2000” (Information Technology Act 2000) these laws came into being in India which trades with the cybercrime and electronic commerce. It is normally based on the UNCITRAL Model Law on International Commercial Arbitration which is suggested by the General Assembly of the United Nation.

What is Cyber Crime?

Cybercrime is the unlawful activity that takes place in the cyberspace, and the most popular cyber activity is hacking where a hacker hacks the account and seize all the secret data of the user and trade those data which include taking identities, and significant data, infringing the privacy and performing fraud. Hacking is the most popular cybercrime that was unevenly originated in the 1960s.

According to the Identical Theft Resource Centre, more than 220 million Facebook user’s phone numbers and usernames were discovered on trade on the Dark Web in the year 2018, higher than 30% to 40% are influenced by cybercrime. Due to this outcome companies have spent more than $1 trillion on cybersecurity. Some firms offer cybersecurity to firms like Banking, Insurance Company, Finance Company.

Types of Cyber Security

Cyber-attack has evolved a long way from transferring the virus by emails. Cybercriminals devise several plans to combat various computers and operations. As the criminal has adjusted the current system according to the growing time, so to prevent the violation of security IT security specialists are there whose work is to keep our data secure.


Deceiving the person to get valuable data or any erudition through which they can obtain to their private data and hurt them monetarily or in any other way. In the modern case of Poona Auto Ancillaries Pvt. Ltd. V. Punjab National Bank HQ New Delhi in this case, a fraudster has given Rs. 80.10 Lakh from Mathur’s account to PNB, Maharashtra’s IT director Rajesh Agrawal has commanded to PNB to repay Rs. 45 lakhs to the complainant Mr Mathur.


A hacker is a person who discovers and misuses the violation of system and access in the system or network to obtain admittance.[iv] These Hackers are ordinarily the experienced computer programmers who understand the minute portion of applications and know-how to breach the system, with this specialized expertise expanded bugs and viruses to penetrate different networks and abuse the information. the aim of most of the hackers is to strike on the corporate group and government organization.

Personality Theft

It is the particular type of offence where hackers infiltrate the person’s, private data including password, debit card, credit card particulars, data regarding the bank statements,[v] social protection, and other delicate data. In other words, we can tell that it is the value of someone else’s identification which is being utilized for the private advantage to obtain financial gain. According to the Norton Life Lock statement which states that in every 10 characters out of every 4 persons have experienced identity theft in India. It has observed the influence of identity fraud more within the age group of 18-39 years, the information tells that a larger fraction of young adults are impacted by identity theft.

Computer Virus

It is an undesirable program that self-replicates by replicating itself to another program. The goal of producing the virus is to affect the computer with a virus and get entrance to their data and delicate information. Hackers plan viruses with spiteful plans and victims on online users to locate their device and collect the required data or to injure their device by viruses. [vi] Viruses ordinarily spread fast and can shift to the movable equipment.


Cyberbullying is also identified as cyber harassment. Cyberharassment normally takes the position in the virtual program, and most of today’s juvenility have experienced cyber harassment. In simplistic terms using any virtual stage to harass, abuse, humiliate or target any person by transferring threatening or rude text and tweets or by posting any secret information, photo edit, or video device to harm or humiliate someone else. The precautionary means has been carried against cyberbullying in India by formulating laws, IT Act, Sec.66(A) trades with while communication transmitting offensive words. Sec.66(D) it deals with cheating by utilizing any electronic means, Sec.66(E) come under breach of the secrecy of the person, 67(B) it deals with the penalty for publishing to child sexuality content and Sec.72 it trades with the breach of confidentiality and secrecy.


Cyberstalking is utilizing any electronic means to track a distinct person or any combination of people, most of the victims of those acts are essentially women’s and children they have regularly undergone by cyberstalking.[vii] Cyberstalking is essentially a kind of cyberbullying where the characters chase the hidden or perhaps known person in the virtual realm and continuously accompany a victim over a lengthy period,[viii] and additional tries to text the prey and try to perform blank phone calls continuously which may convert into harassment, It is a criminal offence.

Software Piracy

It is the copying of the primary content and generating copy, and getting it open for the people which is an invasion of the copyright. In other words, using copyright content virtually using any previous agreement, such as music, movies, software, and books, people can reach these by the means of torrent these are the criminal origin and guilty offence. [ix]


Safeguards are required to guarantee that laws that put limitations on Internet access and content are not harmed and are by the rule of legality and human rights. Transparency in law is also required to guarantee that laws are not applied to prevent admittance to content in a way that infringes human rights law. A risk endures for “mission creep” or “function creep”, where laws and investigatory skills added to mark one kind of cybercrime are then used to target other, less severe kinds of cybercrime. What is more, objections concerning the scope and impact of cybercrime laws occur where “Internet content that is created and admissible in one country is made accessible in a third country” where the content is deemed unlawful.


[i] Archana Choudary, What is Network Security: An introduction to Network Security,  Edureka, Last updated on Jul 01, 2020

[ii] Matt Curtin, Introduction to Network Security, Kent Information Services, Inc., March 1997.

[iii] Computer Network Security, java T point.

[iv] What is Hacking? Introduction & Types, guru99

[v] “Computer fraud”, TheFreeDictionary.com. Retrieved 2015-12-29.

[vi] What is Computer Fraud? (with pictures)”. wiseGEEK. Retrieved 2015-12-08.

[vii]  “Cyberstalking”. Oxford University Press. Retrieved 2013-12-10.

[viii] Spitzberg, Brian H.; Hoobler, Gregory (February 2002). “Cyberstalking and the technologies of interpersonal terrorism” (PDF). New Media & Society. 1. 4: 71–92

[ix] “Definition of Internet piracy”. PC Magazine Encyclopedia. Retrieved 26 October 2018.

About the Author

Nishtha Kheria

Nishtha Kheria

Nishtha Kheria is a 4th Year BBA LLB student studying at Amity Law School Amity University, Noida who has a keen interest in writing and reading blogs and articles.
Her articles and research papers have been published in various Journals. The person should be hardworking and should have the courage to achieve their goals in life.

Leave a Reply