Skip to main content
Cyber crime against women: 

Types 



There have been numerous technological advancements over the last decade. These days we have come across number of crimes against women. Cyber Crimes against Women in India reveals loopholes in the present laws and policies of the Indian judicial system. Recent researches reveal that over the years the cyber crimes have increased by nearly 63.7 per cent.

Types of cyber crime that are committed against women:

Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. Harassment includes blackmailing, threatening, bullying, and even cheating via email. E-harassments are similar to the letter harassment but creates problem quite often when posted from fake ids.
Cyber-stalking: Cyber stalking is one of the most talked about net crimes in the modern world. The Oxford dictionary defines stalking as “pursuing stealthily”. Cyber stalking   involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. Cyber Stalking usually occurs with women, who are stalked by men, or children who are stalked by adult predators or paedophiles.
Cyber pornography: Cyber pornography is the other threat to the female netizens. This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).


Defamation:  Cyber tort including libel and defamation is another common crime against women in the net. This occurs when defamation takes place with the help of computers and / or the Internet.
Morphing: Morphing is editing the original picture by unauthorised user or fake identity. It was identified that female’s pictures are downloaded by fake users and again re-posted/uploaded on different websites by creating fake profiles after editing it.
Email spoofing:  A spoofed e-mail may be said to be one, which misrepresents its origin. It shows its origin to be different from which actually it originates.
Amongst the various cyber-crimes committed against individuals and society at large the crimes mentioned above are specially targeting women.
Cyber World is a dark street  wherin lots of people are suffering from different attacks but many are unaware of the fact that these kinds of attacks are going on. Red Team has met and witnessed lot of victims where they don’t know how to prevent and punish those culprit. The main loophole that’s exploited by the attackers is the lack of awareness.
Malware attacks
Cyber Stalking
Cyber Bullying
These are the different kinds of attacks which are dangerously increasing these days.Amidst all the security challenges and questions in front of us, stopping cybercrime is a priority.

Comments

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of...
Are cookies harming your privacy? Internet users consider that their activities on the Internet are being monitored almost every day for different reasons. Sometimes, the ads of a product that we've looked for via search engine on the previous day show up the next day and we are surprised by the suggestions offered by the internet sites as if they know us better than us. Moreover, there are even those who claim that the issues spoken during any conversation are shown as advertisements on the Internet in some ways. However, we continue to use the Internet sites without paying attention to what is written in the small boxes that we face when we first enter them. These small boxes often contain details about how our information and activities are collected and used through cookies, so that we can make better use of the websites. Cookies are small text files with the .txt extension stored on the users' devices through the users' browsers, as opposed to a computer pro...
An initiative from government Cyber Crime Prevention against Women and Children (CCWC) The Scheme for Cyber Crime Prevention against Women and Children (CCWC) has been formulated by the Ministry of Home Affairs to have an effective mechanism to handle cybercrimes against women and children in the country. Components of the CCPWC Scheme Online Cybercrime reporting Unit Forensic Unit Capacity Building Unit Research & development Unit Awareness Creation Unit Type of information that would be considered as evidence while filing complaint related to cybercrime It is important to keep any evidence you may have related to your complaint. Evidence may include: Credit card receipt Bank statement Envelope (if received a letter or item through mail or courier) Brochure/Pamphlet Online money transfer receipt Copy of email URL of webpage Chat transcripts Suspect mobile number screenshot Videos Images Any other kind of document There is need for a well-define...