D.A.V. PUBLIC SCHOOL, BRIJ VIHAR

Ghaziabad ( U.P.) 201011

Cyber Crimes and Cyber Safety  

Cyber Crime & Cyber Safety


A. Cyber Crime Basics

  1. Cyber Crime – Illegal activities using computers or the internet.
    Example: Hacking a bank’s database to steal money.

  2. Hacker – A person who gains unauthorized access to systems.
    Example: Breaking into someone’s email account.

  3. Cracker – A malicious hacker who breaks into systems to cause harm.
    Example: Cracking software to disable license keys.

  4. Script Kiddie – An amateur hacker using ready-made tools.
    Example: Running pre-written malware scripts without understanding them.

  5. Cyber Forensics – Investigation of crimes involving computers.
    Example: Tracing deleted emails to catch a fraudster.

  6. White Hat Hacker – Ethical hacker who tests security.
    Example: Finding security loopholes for a company.

  7. Black Hat Hacker – Malicious hacker for personal gain.
    Example: Stealing credit card information online.

  8. Gray Hat Hacker – Hacker who sometimes breaks rules but not for evil purposes.
    Example: Exposing security flaws without permission.

  9. Cyber Law – Legal rules dealing with online crimes.
    Example: IT Act 2000 in India regulates cyber crimes.

  10. Digital Footprint – Online traces left by users.
    Example: Comments, likes, or browsing history stored online.


B. Cyber Attacks

  1. Phishing – Fraudulent emails/messages to steal data.
    Example: Fake bank email asking for password.

  2. Spear Phishing – Targeted phishing towards specific people.
    Example: Email to a CEO pretending to be from a trusted vendor.

  3. Whaling – Phishing attack targeting high-profile individuals.
    Example: Attacking a government minister’s email.

  4. Vishing – Voice phishing using phone calls.
    Example: Caller pretending to be from a bank to steal PIN.

  5. Smishing – Phishing via SMS.
    Example: Fake lottery winning SMS with malicious link.

  6. Spoofing – Faking identity online.
    Example: Email appearing from “support@paypal.com” but fake.

  7. Malware – Malicious software harming computers.
    Example: A virus deleting files.

  8. Virus – Self-replicating malware attached to files.
    Example: “ILOVEYOU” virus spreading via email attachments.

  9. Worm – Malware spreading without human action.
    Example: Internet worm infecting thousands of computers automatically.

  10. Trojan Horse – Malware disguised as useful software.
    Example: Fake “video player” that installs spyware.

  11. Ransomware – Locks data until ransom is paid.
    Example: WannaCry attack demanding Bitcoin payment.

  12. Spyware – Monitors user activities secretly.
    Example: Keylogger recording typed passwords.

  13. Adware – Displays unwanted ads on devices.
    Example: Free apps showing pop-ups continuously.

  14. Botnet – Network of infected devices controlled remotely.
    Example: DDoS attack using thousands of hijacked computers.

  15. Denial of Service (DoS) – Overloading a system to crash it.
    Example: Flooding a website with traffic to make it unavailable.

  16. Distributed DoS (DDoS) – DoS using multiple infected systems.
    Example: Amazon servers attacked by huge botnet.

  17. Zero-Day Attack – Exploiting software before a patch is released.
    Example: Using a new Windows flaw before Microsoft fixes it.

  18. Brute Force Attack – Trying all password combinations.
    Example: Guessing a Wi-Fi password by repeated trials.

  19. Dictionary Attack – Using wordlists to crack passwords.
    Example: Using common words to guess “password123”.

  20. SQL Injection – Malicious SQL queries to steal database info.
    Example: Getting usernames and passwords from a website’s database.


C. Cyber Crimes Against People

  1. Cyber Bullying – Harassment using digital platforms.
    Example: Sending abusive comments on social media.

  2. Cyber Stalking – Repeatedly monitoring someone online.
    Example: Tracking someone’s Facebook posts without consent.

  3. Identity Theft – Stealing personal details to commit fraud.
    Example: Using someone’s Aadhaar number to open a bank account.

  4. Online Fraud – Cheating through online transactions.
    Example: Fake shopping site taking money without delivery.

  5. Job Scam – Fake job offers to cheat people.
    Example: Charging “registration fees” for a non-existent job.

  6. Catfishing – Creating fake profiles to deceive people.
    Example: Pretending to be a different person on dating apps.

  7. Revenge Porn – Sharing private photos without consent.
    Example: Ex-partner uploading intimate videos online.

  8. Cyber Grooming – Building online relationships to exploit minors.
    Example: Convincing a child to share private photos.

  9. Sextortion – Blackmailing using private photos/videos.
    Example: Threatening to leak images unless money is paid.

  10. Impersonation – Pretending to be someone else online.
    Example: Fake Facebook account of a celebrity.


D. Cyber Crimes Against Property

  1. Cyber Vandalism – Damaging digital property.
    Example: Defacing a company’s website.

  2. Data Theft – Stealing digital information.
    Example: Copying customer databases illegally.

  3. Intellectual Property Theft – Stealing creative work.
    Example: Downloading pirated software or movies.

  4. Software Piracy – Copying/distributing software illegally.
    Example: Selling cracked versions of Windows.

  5. Salami Attack – Small unnoticed thefts adding up to large fraud.
    Example: Bank employee deducting a few paise from each account.

  6. Logic Bomb – Code that triggers on a condition.
    Example: Employee plants malware to delete data after leaving job.

  7. Cyber Espionage – Spying on organizations/governments online.
    Example: Hacking defense ministry emails.

  8. Website Defacement – Unauthorized alteration of a webpage.
    Example: Changing a university homepage with offensive content.

  9. Online Auction Fraud – Misleading buyers on e-commerce sites.
    Example: Selling fake iPhones on eBay.

  10. Financial Fraud – Using cyberspace to cheat money.
    Example: Online banking scams.


E. Cyber Safety Practices

  1. Antivirus Software – Protects systems from malware.
    Example: Using Quick Heal or Norton.

  2. Firewall – Blocks unauthorized access to networks.
    Example: Windows Firewall stopping suspicious traffic.

  3. Encryption – Converting data into unreadable code.
    Example: WhatsApp chats are end-to-end encrypted.

  4. Two-Factor Authentication (2FA) – Extra security with OTP or biometrics.
    Example: Logging into Gmail with password + OTP.

  5. Password Manager – Tool to store complex passwords.
    Example: LastPass, Bitwarden.

  6. Strong Password – Mix of letters, numbers & symbols.
    Example: S@feP@ss2025!

  7. Digital Signature – Electronic authentication method.
    Example: Signing e-documents for e-filing taxes.

  8. VPN (Virtual Private Network) – Secures internet connection by hiding IP.
    Example: Using NordVPN for safe browsing.

  9. Biometric Authentication – Security using fingerprints/face scan.
    Example: Unlocking phone with fingerprint.

  10. Backup – Copying data to avoid loss.
    Example: Saving files to Google Drive weekly.


F. Social Media & Online Safety

  1. Privacy Settings – Controls who sees your data online.
    Example: Making Instagram account private.

  2. Cyber Hygiene – Safe online habits.
    Example: Regularly updating software and changing passwords.

  3. Digital Detox – Taking a break from online activities.
    Example: Staying offline on weekends.

  4. Oversharing – Posting too much personal info online.
    Example: Sharing travel details publicly on Facebook.

  5. Clickjacking – Tricking users to click hidden elements.
    Example: Hidden “Like” button under a video.

  6. Fake News – False info spread online.
    Example: Hoax about celebrity deaths on Twitter.

  7. Trolling – Posting offensive comments to provoke others.
    Example: Insulting players after a sports match online.

  8. Digital Addiction – Overuse of digital devices.
    Example: Gaming for 12 hours daily ignoring studies.

  9. Online Reputation – How people see you online.
    Example: Employers checking LinkedIn before hiring.

  10. Cyber Wellness – Balancing safe & healthy online use.
    Example: Limiting screen time for mental health.


G. Advanced Cyber Concepts

  1. Blockchain Security – Securing transactions with blockchain.
    Example: Bitcoin using blockchain for safe transfers.

  2. Cryptojacking – Using someone’s device to mine crypto secretly.
    Example: Malicious site using visitor’s CPU for mining.

  3. Deepfake – AI-generated fake videos/images.
    Example: Fake video of a politician giving a speech.

  4. Dark Web – Hidden part of internet used for illegal trade.
    Example: Buying drugs or weapons using Tor browser.

  5. Surface Web – Normal accessible internet.
    Example: Google search results pages.

  6. Deep Web – Data not indexed by search engines.
    Example: Private databases, academic journals.

  7. IoT Hacking – Attacking smart devices.
    Example: Hacking smart cameras to spy.

  8. Cloud Security – Protecting data on online servers.
    Example: Securing Google Drive with 2FA.

  9. Digital Currency Fraud – Scams using cryptocurrencies.
    Example: Fake Bitcoin investment schemes.

  10. Social Engineering – Tricking people to reveal info.
    Example: Pretending to be IT staff to get passwords.


H. Cyber Laws & Governance

  1. IT Act 2000 (India) – First Indian cyber law.
    Example: Punishes identity theft & hacking.

  2. GDPR (Europe) – Data protection law.
    Example: EU companies need user consent for data use.

  3. Cyber Ethics – Responsible online behavior.
    Example: Not downloading pirated movies.

  4. Copyright Violation – Using creative work without permission.
    Example: Uploading a song without crediting owner.

  5. Cyber Security Policy – Rules for safe IT use in organizations.
    Example: Company banning use of USB drives at work.

  6. CERT-In – Indian cyber emergency response team.
    Example: Responding to major DDoS attacks in India.

  7. Cyber Tribunal – Special court for cyber crimes.
    Example: Hearing disputes on digital fraud cases.

  8. Digital Evidence – Electronic data used in court.
    Example: Chat logs submitted as proof of cyber harassment.

  9. Cyber Patrol – Online monitoring by authorities.
    Example: Police tracking illegal dark web trade.

  10. Cyber Insurance – Financial protection from cyber attacks.
    Example: Company claiming insurance after ransomware loss.


I. Miscellaneous Terms

  1. Online Banking Fraud – Stealing money via digital banking.
    Example: Fake UPI request to transfer funds.

  2. E-Waste – Discarded electronic devices.
    Example: Old laptops dumped without wiping data.

  3. Keystroke Logging – Recording keys typed.
    Example: Malware capturing ATM PIN.

  4. Drive-By Download – Automatic download of malware.
    Example: Visiting infected websites installing trojans.

  5. Cyber Terrorism – Using internet to spread terror.
    Example: Hacking government websites for propaganda.

  6. Digital Divide – Gap between digital haves & have-nots.
    Example: Rural areas lacking internet access.

  7. Blue Whale Challenge – Deadly online game forcing self-harm.
    Example: Teen deaths reported due to the challenge.

  8. Fake Profile Scam – Creating fake social media accounts.
    Example: Impersonating friend to borrow money online.

  9. Shoulder Surfing – Watching someone’s screen/password.
    Example: Peeking at ATM PIN while person types.

  10. Cyber Safety Awareness – Educating users about safe online practices.
    Example: School workshops on phishing prevention.

 
 
Contact Us ↓
 

D.A.V. PUBLIC SCHOOL, BRIJ VIHAR
Brij Vihar, Ghaziabad ( U.P.) 201011
Phone No. : 0120-4113643
Email : davbrijvihar1@gmail.com
Website : davbrijvihar.com


Like Us on:
     
Location Map ↓