Sedulity Groups | Different Types of Hackers in Cyber World

Dear Readers, in this artcle I am trying to give precise information about ‘different types of Cyber Crimes’ which is very important to know in this Computer Era and I am sure that it will help you all to be aware of all such crimes. Over the past 10 years the Internet has become very important source in the India.

People of all ages use it on a regular basis, and it has become one of the driving forces of the economy. From banking to shopping, it has radically changed the way many people go about their daily lives. The increased availability of broadband connections allows more people to experience all that the Internet has to offer. However, there are lot of crimes which are being held so frequently which are mentioned as below;

Cyber Terrorism: Cyber Terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyber Pornography: Cyber Pornography refers to stimulating sexual or other erotic activity over the internet. It has been traded over the internet since 1980’s, it was the invention of the world wide web in 1991 as well as the opening of the Internet to the general public around the same time that led to an explosion in online pornography. The Internet has proven popular for distributing pornography because it allows people to view pornography anonymously in the comfort and privacy of their home.
Cyber Defamation: Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others. Cyber defamation is not different from conventional defamation except the involvement of a virtual medium. Example: A defamatory article can be published in a newspaper or it can be published on a website. Publishing through a website would amount to cyber defamation.
Cyber Stalking: Cyber Stalking is the use of the Internet or other electronic means to Stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
Data Diddling: Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. It also include automatic changing the financial information for some time before processing and then restoring original information.