Sie sind auf Seite 1von 1

Types of internet crimes

Internet crimes are not confined to a particular form but her crimes appeared several other images vary
with the immediate goal in crime.. The main targets of such crimes are as follows: first: the manufacture
. and dissemination of viruses: the most popular and influential Internet crimes
II: breakthroughs: the unauthorized access to computers or computer networks. The bulk of intrusions (or
attempted intrusions) through programs available online and may be a modest technical expertise to use
. them for attacks on others, and therein lies the danger
III: disable hardware: more recently such processes, where the perpetrators to disable hardware or
networks to perform their work without the penetration of those devices. Idle process by sending an
overwhelming number of messages in ways that certain technical devices or networks that you want to
.disable it you are constrained by the performance of its work
IV: identity theft: the crime of using other personal identity illegally, intended either for the use of that
identity (i.e., the identity of the victim) or to hide the identity of the offender to facilitate the Commission
.of other crimes
VA: harassment and prosecution: the prosecution is crime on the Internet often use e-mail or means of
immediate dialogues on the Web. Include prosecution threats, intimidation and harassment. Consistent
prosecution of crimes on the Internet with those outside of the network's goals and the desire to control
. the victim
And offences of harassment and stalking online easily possible offender to conceal his identity in addition
to multiplicity and easy means of communication across the network, which helped in the spread of this
. crime
VI: victimization and grooming: most victims of such crimes are young Web users. Where criminals
purported victims of their wish to form a friendship that may develop into a physical encounter between
the two sides. And the fact that most of the victims are young, many accidents are not reported, where
. many of the victims are not aware that they have been deceived
VII: libel and slander: the offender information may be confidential or erroneous or misleading about the
victim, who may be an individual or a society or Enterprise multiple methods used in this type of crime, but
list these methods create a website containing information to publish or send this information via the
.mailing lists to large numbers of users
VIII: production and dissemination of pornography: the Internet has provided the most effective and
attractive to industry and disseminating porn. The Internet has made porn in various means of
presentation of pictures and videos and dialogues within everyone's reach, and perhaps this was the most
.negative aspects of the Internet
IX: fraud: the Internet has become plenty of his goods or commercial services wants to make, and means
unprecedented as using e-mail or displayed on the website or through the discussion boards. Of course,
.these tools are abused in the scam. And uses email regularly received letters of this type

Das könnte Ihnen auch gefallen