-
Cyber Crime – Illegal activities using computers or the internet.
Example: Hacking a bank’s database to steal money.
-
Hacker – A person who gains unauthorized access to systems.
Example: Breaking into someone’s email account.
-
Cracker – A malicious hacker who breaks into systems to cause harm.
Example: Cracking software to disable license keys.
-
Script Kiddie – An amateur hacker using ready-made tools.
Example: Running pre-written malware scripts without understanding them.
-
Cyber Forensics – Investigation of crimes involving computers.
Example: Tracing deleted emails to catch a fraudster.
-
White Hat Hacker – Ethical hacker who tests security.
Example: Finding security loopholes for a company.
-
Black Hat Hacker – Malicious hacker for personal gain.
Example: Stealing credit card information online.
-
Gray Hat Hacker – Hacker who sometimes breaks rules but not for evil purposes.
Example: Exposing security flaws without permission.
-
Cyber Law – Legal rules dealing with online crimes.
Example: IT Act 2000 in India regulates cyber crimes.
-
Digital Footprint – Online traces left by users.
Example: Comments, likes, or browsing history stored online.
-
Phishing – Fraudulent emails/messages to steal data.
Example: Fake bank email asking for password.
-
Spear Phishing – Targeted phishing towards specific people.
Example: Email to a CEO pretending to be from a trusted vendor.
-
Whaling – Phishing attack targeting high-profile individuals.
Example: Attacking a government minister’s email.
-
Vishing – Voice phishing using phone calls.
Example: Caller pretending to be from a bank to steal PIN.
-
Smishing – Phishing via SMS.
Example: Fake lottery winning SMS with malicious link.
-
Spoofing – Faking identity online.
Example: Email appearing from “support@paypal.com” but fake.
-
Malware – Malicious software harming computers.
Example: A virus deleting files.
-
Virus – Self-replicating malware attached to files.
Example: “ILOVEYOU” virus spreading via email attachments.
-
Worm – Malware spreading without human action.
Example: Internet worm infecting thousands of computers automatically.
-
Trojan Horse – Malware disguised as useful software.
Example: Fake “video player” that installs spyware.
-
Ransomware – Locks data until ransom is paid.
Example: WannaCry attack demanding Bitcoin payment.
-
Spyware – Monitors user activities secretly.
Example: Keylogger recording typed passwords.
-
Adware – Displays unwanted ads on devices.
Example: Free apps showing pop-ups continuously.
-
Botnet – Network of infected devices controlled remotely.
Example: DDoS attack using thousands of hijacked computers.
-
Denial of Service (DoS) – Overloading a system to crash it.
Example: Flooding a website with traffic to make it unavailable.
-
Distributed DoS (DDoS) – DoS using multiple infected systems.
Example: Amazon servers attacked by huge botnet.
-
Zero-Day Attack – Exploiting software before a patch is released.
Example: Using a new Windows flaw before Microsoft fixes it.
-
Brute Force Attack – Trying all password combinations.
Example: Guessing a Wi-Fi password by repeated trials.
-
Dictionary Attack – Using wordlists to crack passwords.
Example: Using common words to guess “password123”.
-
SQL Injection – Malicious SQL queries to steal database info.
Example: Getting usernames and passwords from a website’s database.
-
Cyber Bullying – Harassment using digital platforms.
Example: Sending abusive comments on social media.
-
Cyber Stalking – Repeatedly monitoring someone online.
Example: Tracking someone’s Facebook posts without consent.
-
Identity Theft – Stealing personal details to commit fraud.
Example: Using someone’s Aadhaar number to open a bank account.
-
Online Fraud – Cheating through online transactions.
Example: Fake shopping site taking money without delivery.
-
Job Scam – Fake job offers to cheat people.
Example: Charging “registration fees” for a non-existent job.
-
Catfishing – Creating fake profiles to deceive people.
Example: Pretending to be a different person on dating apps.
-
Revenge Porn – Sharing private photos without consent.
Example: Ex-partner uploading intimate videos online.
-
Cyber Grooming – Building online relationships to exploit minors.
Example: Convincing a child to share private photos.
-
Sextortion – Blackmailing using private photos/videos.
Example: Threatening to leak images unless money is paid.
-
Impersonation – Pretending to be someone else online.
Example: Fake Facebook account of a celebrity.
-
Cyber Vandalism – Damaging digital property.
Example: Defacing a company’s website.
-
Data Theft – Stealing digital information.
Example: Copying customer databases illegally.
-
Intellectual Property Theft – Stealing creative work.
Example: Downloading pirated software or movies.
-
Software Piracy – Copying/distributing software illegally.
Example: Selling cracked versions of Windows.
-
Salami Attack – Small unnoticed thefts adding up to large fraud.
Example: Bank employee deducting a few paise from each account.
-
Logic Bomb – Code that triggers on a condition.
Example: Employee plants malware to delete data after leaving job.
-
Cyber Espionage – Spying on organizations/governments online.
Example: Hacking defense ministry emails.
-
Website Defacement – Unauthorized alteration of a webpage.
Example: Changing a university homepage with offensive content.
-
Online Auction Fraud – Misleading buyers on e-commerce sites.
Example: Selling fake iPhones on eBay.
-
Financial Fraud – Using cyberspace to cheat money.
Example: Online banking scams.
-
Antivirus Software – Protects systems from malware.
Example: Using Quick Heal or Norton.
-
Firewall – Blocks unauthorized access to networks.
Example: Windows Firewall stopping suspicious traffic.
-
Encryption – Converting data into unreadable code.
Example: WhatsApp chats are end-to-end encrypted.
-
Two-Factor Authentication (2FA) – Extra security with OTP or biometrics.
Example: Logging into Gmail with password + OTP.
-
Password Manager – Tool to store complex passwords.
Example: LastPass, Bitwarden.
-
Strong Password – Mix of letters, numbers & symbols.
Example: S@feP@ss2025!
-
Digital Signature – Electronic authentication method.
Example: Signing e-documents for e-filing taxes.
-
VPN (Virtual Private Network) – Secures internet connection by hiding IP.
Example: Using NordVPN for safe browsing.
-
Biometric Authentication – Security using fingerprints/face scan.
Example: Unlocking phone with fingerprint.
-
Backup – Copying data to avoid loss.
Example: Saving files to Google Drive weekly.
-
Privacy Settings – Controls who sees your data online.
Example: Making Instagram account private.
-
Cyber Hygiene – Safe online habits.
Example: Regularly updating software and changing passwords.
-
Digital Detox – Taking a break from online activities.
Example: Staying offline on weekends.
-
Oversharing – Posting too much personal info online.
Example: Sharing travel details publicly on Facebook.
-
Clickjacking – Tricking users to click hidden elements.
Example: Hidden “Like” button under a video.
-
Fake News – False info spread online.
Example: Hoax about celebrity deaths on Twitter.
-
Trolling – Posting offensive comments to provoke others.
Example: Insulting players after a sports match online.
-
Digital Addiction – Overuse of digital devices.
Example: Gaming for 12 hours daily ignoring studies.
-
Online Reputation – How people see you online.
Example: Employers checking LinkedIn before hiring.
-
Cyber Wellness – Balancing safe & healthy online use.
Example: Limiting screen time for mental health.
-
Blockchain Security – Securing transactions with blockchain.
Example: Bitcoin using blockchain for safe transfers.
-
Cryptojacking – Using someone’s device to mine crypto secretly.
Example: Malicious site using visitor’s CPU for mining.
-
Deepfake – AI-generated fake videos/images.
Example: Fake video of a politician giving a speech.
-
Dark Web – Hidden part of internet used for illegal trade.
Example: Buying drugs or weapons using Tor browser.
-
Surface Web – Normal accessible internet.
Example: Google search results pages.
-
Deep Web – Data not indexed by search engines.
Example: Private databases, academic journals.
-
IoT Hacking – Attacking smart devices.
Example: Hacking smart cameras to spy.
-
Cloud Security – Protecting data on online servers.
Example: Securing Google Drive with 2FA.
-
Digital Currency Fraud – Scams using cryptocurrencies.
Example: Fake Bitcoin investment schemes.
-
Social Engineering – Tricking people to reveal info.
Example: Pretending to be IT staff to get passwords.
-
IT Act 2000 (India) – First Indian cyber law.
Example: Punishes identity theft & hacking.
-
GDPR (Europe) – Data protection law.
Example: EU companies need user consent for data use.
-
Cyber Ethics – Responsible online behavior.
Example: Not downloading pirated movies.
-
Copyright Violation – Using creative work without permission.
Example: Uploading a song without crediting owner.
-
Cyber Security Policy – Rules for safe IT use in organizations.
Example: Company banning use of USB drives at work.
-
CERT-In – Indian cyber emergency response team.
Example: Responding to major DDoS attacks in India.
-
Cyber Tribunal – Special court for cyber crimes.
Example: Hearing disputes on digital fraud cases.
-
Digital Evidence – Electronic data used in court.
Example: Chat logs submitted as proof of cyber harassment.
-
Cyber Patrol – Online monitoring by authorities.
Example: Police tracking illegal dark web trade.
-
Cyber Insurance – Financial protection from cyber attacks.
Example: Company claiming insurance after ransomware loss.
-
Online Banking Fraud – Stealing money via digital banking.
Example: Fake UPI request to transfer funds.
-
E-Waste – Discarded electronic devices.
Example: Old laptops dumped without wiping data.
-
Keystroke Logging – Recording keys typed.
Example: Malware capturing ATM PIN.
-
Drive-By Download – Automatic download of malware.
Example: Visiting infected websites installing trojans.
-
Cyber Terrorism – Using internet to spread terror.
Example: Hacking government websites for propaganda.
-
Digital Divide – Gap between digital haves & have-nots.
Example: Rural areas lacking internet access.
-
Blue Whale Challenge – Deadly online game forcing self-harm.
Example: Teen deaths reported due to the challenge.
-
Fake Profile Scam – Creating fake social media accounts.
Example: Impersonating friend to borrow money online.
-
Shoulder Surfing – Watching someone’s screen/password.
Example: Peeking at ATM PIN while person types.
-
Cyber Safety Awareness – Educating users about safe online practices.
Example: School workshops on phishing prevention.