Home >>Interview Questions >Cyber Security Interview Question and Answers
Cybercrime extends to all the actions carried out in cyberspace with criminal intent. Due to the internet's anonymous nature, miscreants participate in a number of criminal activities. The cybercrime field is just emerging and with each passing day, new types of criminal activities in cyberspace are coming to the fore.
No, we don't have an exhaustive concept of cybercrime, unfortunately. Any online activity that essentially offends human sensibility may, however, be considered a cybercrime.
Cybercrimes can generally be divided into three major categories.
Cybercrimes committed against individuals include various crimes such as child pornography transmission, e-mail harassment and cyber-stalking. One of the most significant cybercrimes known today is publishing and distributing obscene material.
A different cybercrime is cyber harassment. In cyberspace, various kinds of harassment occur. Sexual, racial, religious, or other harassment may be disturbing. As a felony, cyber abuse also takes us to another related area of violation of netizens' privacy. Violation of the privacy of online citizens is a severe cybercrime.
Illegal computer trespassing through cyberspace, computer vandalism, the transmission of even against, and unauthorised access possession of computerised information include cybercrimes against all types of property.
Hacking is one of the most significant cybercrimes known to date. Knowing that a stranger has broken into your computer system without your knowledge and has abused precious confidential data is a terrible feeling.
The bitter fact is that there is no computer system in the world that is evidence of hacking. It is unanimously accepted that every system can be hacked, however secure it may look. A new type of cybercrimes that is slowly emerging as highly dangerous is the recent denial of service attacks seen on popular commercial sites such as E-bay, Yahoo, and Amazon.
It is a very serious offence to use one's own programming expertise to gain unauthorized access to a computer or network. Similarly, another kind of cybercrime is the creation and dissemination of harmful computer software that does irreparable damage to computer systems.
One distinct example of cybercrime against the government is cyber terrorism. The development of the internet has shown that individuals and groups are using the medium of cyberspace to threaten governments as well as terrorise a country's people. When a person hacks into a website run by the government or military, this crime manifests itself into terrorism.
We don't have any comprehensive cybercrime legislation anywhere in the world as of now. This is why investigating agencies such as the FBI found that cyberspace is extremely challenging terrain. Cybercrimes fall into the grey field of Internet law that is not covered in full or in part by existing laws. Countries, however, are taking important steps to establish stringent cybercrime laws.
The most recent case of the "I love you" virus shows the need to have cyber laws in various national jurisdictions concerning cybercrimes. At the time of this feature's web update, Reuters reported that "The Philippines has yet to arrest the suspected creator of the computer virus 'Love Bug' because it lacks computer crime rules, a senior police officer said." The truth is that there are no laws in the Philippines relating to cybercrime.
Vishing is the criminal practice of using social control over the telephone system to obtain access to sensitive information such as credit card data from the public, most commonly using features allowed by Voice over IP ( VoIP). The word is a combination of phishing and "Voice."
Mail fraud is an offence under U.S. federal law that involves any scheme that seeks to obtain money or valuables unlawfully under which the postal system is used in the commission of a criminal act at any point.
It is the practise of using the telephone network to display a number that is not that of the actual originating station on the receiver's caller ID display.
It is the act or activity of collecting secrets using illegal manipulation methods on the internet from individuals, competitors, rivals, groups, governments, and enemies for military, political, or economic advantage.
Literally, sabotage involves intentional damage to any machinery or materials or work disruption. In the context of cyber space, computers and satellites used in military activities are a threat to the life of.
The first democratic country in which this law was first introduced was South Korea.
Bots are one of the most sophisticated approaches of crime-ware that the internet faces today. Bots earn their unique name on behalf of cybercriminals by performing a wide variety of automated tasks. In the "denial of service" attack on the Internet, they play a significant role.
Trojans and spyware are the tools that a cyber-criminal could use as part of an attack to obtain unauthorised access and steal information from a victim.
The most common ways of carrying out identity theft are phishing and pharming, which is a form of cybercrime in which criminals use the internet to steal personal information from others.