Cybersecurity
Classification of
cybercrimes
Cybercrimes are
unlawful acts
committed using
digital devices or
networks. They can
be broadly classified
based on the target
and nature of the
offense.
types
1) Cybercrimes Against
individual
2) Cybercrimes Against
Property
3) Cybercrimes Against
1. Cybercrimes Against
individual
These crimes target a person’s identity, privacy, or
emotional well-being.
Email Spoofing: Forging email headers to make messages
appear from trusted sources, often used in phishing.
Spamming: Sending bulk unsolicited messages, which may
carry malware or scams.
Cyber Defamation: Publishing false or harmful content
online to damage someone’s reputation.
Cyberstalking & Harassment: Persistent tracking or
2.Cybercrimes Against
Property
These involve unauthorized access or damage to digital
assets.
Credit Card Fraud: Using stolen card details for
illegal purchases.
Internet Time Theft: Illegally using someone else's
paid internet service.
Intellectual Property Crimes:
Software Piracy: Unauthorized copying or
distribution of software.
3. Cybercrimes Against
Organizations
These disrupt business operations or compromise
sensitive data.
Unauthorized Access: Hacking into systems to
steal or manipulate data.
Denial of Service (DoS): Flooding servers to
crash websites or services.
Logic Bombs & Trojan Horses: Malicious code
triggered under specific conditions.
Email Bombing: Overloading inboxes with
thousands of messages.
4. Cybercrimes Against
Society
These have broader implications for public safety
and national security.
Cyber Terrorism: Attacks on critical
infrastructure to incite fear.
Web Jacking: Taking control of a website and
altering its content.
Online Trafficking: Using digital platforms for
illegal trade (e.g., drugs, weapons, human
trafficking).
Common Cybercrimes
Cybercrime refers to
illegal activities carried
out using computers,
mobile devices, or the
internet. These crimes
can target individuals,
organizations, or
governments—and they’re
1. Malware Attacks
Includes viruses, worms, trojans, and spyware.
Designed to damage systems, steal data, or spy on
users.
Often spread through malicious downloads or
email attachments.
2. Phishing & Smishing
Phishing: Fake emails or websites that trick users
into revealing sensitive info.
Smishing: Similar scams via SMS messages.
Targets login credentials, banking info, and
personal data.
4. Social Engineering
Manipulates people into giving up confidential
information.
Includes pretexting, baiting, and impersonation.
5. Identity Theft
Stealing personal data to impersonate someone
for financial gain.
Often used in credit card fraud or fake loan
applications.
6. Denial-of-Service (DoS) Attacks
Overloads systems or websites to make them
inaccessible.
7. Mobile-Based Cybercrimes
Mobile malware, SIM swapping, and fake apps.
Targets smartphones through app stores or
unsecured networks.
8. Cyberterrorism
Politically or ideologically motivated attacks on
digital infrastructure.
Aims to cause panic or disrupt national security.
9. Insider Threats
Employees or contractors missuse access to steal or
leak data.
Can be intentional or accidental.
According to recent
reports, cybercrime
caused over $8 trillion
in damages globally in
2023. And with the rise
of AI-powered attacks
and smart devices, the
threat landscape is
Cybercrime targeting
computer
and mobiles
Cybercriminals frequently
exploit vulnerabilities in
both computers and mobile
devices to steal data,
disrupt services, or gain
unauthorized access. These
attacks can be financially
motivated, politically
driven, or simply malicious.
Computers
These attacks focus on desktop systems, servers,
and networks:
Hacking: Unauthorized access to systems to steal
or manipulate data.
Malware Infections: Viruses, worms, trojans, and
spyware that damage or spy on systems.
Ransomware: Encrypts files and demands payment
for decryption.
Denial-of-Service (DoS): Overloads systems to
make them inaccessible.
Data Breaches: Theft of sensitive information from
Cybercrimes Targeting Mobile
Devices
Smartphones and tablets are increasingly targeted due
to their widespread use:
Mobile Malware: Malicious apps or links that infect
devices.
SIM Swapping: Hijacking a phone number to access
banking or social media accounts.
Smishing: Phishing via SMS messages.
Spyware: Secretly monitors user activity, location, or
communications.
Why these devices are targeted
High data value: Personal, financial,
and professional data is stored on these
devices.
Always Connected: Constant internal
access makes them vulnerable.
Weak Security Practices: Outdated
software, poor password hygiene, and
unsecured networks.
How to Protect Yourself
Keep software and apps updated.
Use strong, unique passwords and enable
two-factor authentication.
Avoid clicking on suspicious links or
downloading unknown apps.
Install reputable antivirus and mobile
security tools.
Be cautious with public Wi-Fi—use a VPN
when possible.