Skip to main content
Cyber crime against women: 

Types 



There have been numerous technological advancements over the last decade. These days we have come across number of crimes against women. Cyber Crimes against Women in India reveals loopholes in the present laws and policies of the Indian judicial system. Recent researches reveal that over the years the cyber crimes have increased by nearly 63.7 per cent.

Types of cyber crime that are committed against women:

Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. Harassment includes blackmailing, threatening, bullying, and even cheating via email. E-harassments are similar to the letter harassment but creates problem quite often when posted from fake ids.
Cyber-stalking: Cyber stalking is one of the most talked about net crimes in the modern world. The Oxford dictionary defines stalking as “pursuing stealthily”. Cyber stalking   involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. Cyber Stalking usually occurs with women, who are stalked by men, or children who are stalked by adult predators or paedophiles.
Cyber pornography: Cyber pornography is the other threat to the female netizens. This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).


Defamation:  Cyber tort including libel and defamation is another common crime against women in the net. This occurs when defamation takes place with the help of computers and / or the Internet.
Morphing: Morphing is editing the original picture by unauthorised user or fake identity. It was identified that female’s pictures are downloaded by fake users and again re-posted/uploaded on different websites by creating fake profiles after editing it.
Email spoofing:  A spoofed e-mail may be said to be one, which misrepresents its origin. It shows its origin to be different from which actually it originates.
Amongst the various cyber-crimes committed against individuals and society at large the crimes mentioned above are specially targeting women.
Cyber World is a dark street  wherin lots of people are suffering from different attacks but many are unaware of the fact that these kinds of attacks are going on. Red Team has met and witnessed lot of victims where they don’t know how to prevent and punish those culprit. The main loophole that’s exploited by the attackers is the lack of awareness.
Malware attacks
Cyber Stalking
Cyber Bullying
These are the different kinds of attacks which are dangerously increasing these days.Amidst all the security challenges and questions in front of us, stopping cybercrime is a priority.

Comments

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of
Ways to secure yourself from cyber crime  1) Education - Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal information by pretending to be a legitimate organization or person. These scams often play off major new stories, so keep informed on the latest news-related scams. 2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. 3) Cli
Who are cyber criminals and why do they do it?  We talk a great length about cyber crime. From trends in phishing to exploits to cyber security threats and so much in between. But we don’t often think about who is committing the cyber crime and what motivates them. The motivations for cyber criminals can be quite simple. The two that make up the huge majority are money and information. According to a Verizon Enterprise report, financial and espionage-driven motivation make up a full 93% of motivation for attacks. Aside from that, the less-frequent but broader set of motives is often categorized as  “FIG” (Fun, Ideology, and Grudges). The core motives can vary depending on what the cyber criminal is after, whether they are executing the attacks of their own initiative or if they’ve been contracted to do so, and who might benefit in what way from a successful cyber crime. This variety can be illustrated as follows: Money This can be the motive for many types of attacks,