Cyber Crime FAQ
1. What is meant by Cyber Crime?
Cyber Crime means criminal activity done using computers and the internet. That means criminal exploitation of the internet..

2. Give two examples for Cyber Crimes?
Copyright encroachment and child grooming are two examples for Cyber Crimes.

3. What is Topology?
It means crimes committed directly or indirectly through computer networks or devices.

4. What is meant by Sparm?
Sparm means the unrequested sending of a lot of email for commercial purposes.

5. What is Computer fraud?
The term Computer fraud means any dishonest misrepresentation of fact intended to let another to do from doing something which causes any loss.

6. What are the main reasons for Cyber Crime?
The capacity of computers to store a data in a comparatively small space, negligence in protecting the computers, loss of evidence, the task of remembering computer operating system's codes etc.are the main reasons for Cyber Crime..

7. Give some examples for Cyber criminals?
Children and teenagers between the age group of 6-18, organized hackers, professional hackers, employees dissatisfied with their employers etc. are some examples.

8. What is Cyber terrorism?
Cyber terrorism can be defined as an act of terrorism committed through the use of Cyber space or Computer resources. Some examples for Cyber terrorism are hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power collecting information relevant for running people's lives,robberies,blackmailing etc.

9. Define Cyber warfare?
Cyber warfare can be defined as "actions by a nation to penetrate another nation's computers or networks for the purpose of causing damage or disruption".

10. What is Cyber espionage?
It is the act or practice of obtaining secrets from individuals, competitors,rivals,groups,governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet,networks,software and computers. That means it is a kind of spy work.

11. What is the meaning of Sabotage?
Sabotage literally means willful damage to any machinery or materials or disruption of work. Here it means it is a threat to the existence of computers and satellites used by military activities.

12. What is the role of Electrical power grid in Cyber warfare?
Electric power transmission is liable to be affect Cyber warfare. Massive power outages caused by a cyber attack, could disrupt the economy, distract from a simultaneous military attack, or create a national trauma.

13. Define Cyber war?
Cyber war is defined as the use of internet and related technological means by one state against political,economic,technological and information sovereignty and independence of any other state.

14. What is meant by Computer trespass?
Computer trespass is a computer crime in Kansas, North Carolina,Oklahoma,Pennsylvania,Rhode Island,Tennessee,Virginia and Washington. In Virginia, computer trespass consists of, with malicious intent,copying,altering or erasing data from a computer, causing a computer to malfunction, causing an electronic funds transfer etc.

15. What is Cyber Bullying?
Cyber Bullying is "the use of information and communication technologies to support deliberate, repeated and, hostile behavior by an individual, or group, that is intended to harm others".

16. What is Cyber Defamation?
Cyber Defamation is a crime conducted in cyberspace, usually through the internet, with the intention of defaming others.

17. Name the democratic country in which The Cyber Defamation law was firstly introduced?
South Korea is the democratic country in which this law was introduced first.

18. Name two South Korean celebrities who committed suicide because of Cyber Defamation?
Lee Eun-ju and Jung Da Bin committed suicide because of severe depression caused by malicious online comments. Both were famous young actresses of South Korea.

19. What is meant by Industrial Espionage?
Industrial espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes.

20. What is Malware?
Malware(Malicious software) is a software designed to secretly access a computer system without the owner's informed permission.

21. What is Crime ware?
The software tools used in cyber crime is called Crime ware. Not all software used in the commission of a crime can be defined as Crimeware.FTP clients which may be used in the commission of crimes are considered as Crime ware.

22. What is a Bot?
Bots are one of the most sophisticated types of crime ware facing the internet today. Bots earn their unique name by performing a wide variety of automated tasks on behalf of the cyber criminals who are often safely located somewhere far across the internet. They play a part in "denial of service" attack in internet.

23. What is Trojans&Spy ware?
Trojans and Spy ware are crime ware- two of the essential tools a cyber criminal might use to obtain unauthorized access and steal information from a victim as part of an attack.

24. What is Phishing and Pharming?
Phishing and Pharming are two of the most common ways to done identity theft which is a form of Cyber crime in which criminals use the internet to steal personal information from other users.

25. Define FBI?
The Federal Bureau of Investigation (FBI) is an agency of the United States Department of justice that serves as both a federal criminal investigative body and an internal intelligence agency.

26. What is the motto of FBI?
"Fidelity, Bravery, and Integrity are the motto of FBI.

27. What is the main goal of FBI?
The main goal of FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state,municipal,and international agencies and partners.

28. What is meant by White-collar crime?
It is a crime committed by a person of respectability and high social status in the course of his occupation.

29. Who is a con man?
A con man is one who exploits characteristics of the human psyche such as greed, honesty and dishonesty,vanity,compassion credulity, irresponsibility and the thought of trying to get some thing of value for nothing or for something far less valuable. Confidence men or con men have victimized individuals from all zones of life.

30. What is meant by Industrial espionage?
It is a form of spy work conducted for commercial purposes instead of purely national security purposes. Industrial espionage occurs between companies or corporations.

31. Define INTERPOL?
It is an organization facilitating international Police cooperation. Its full name is the International Criminal Police Organization.

32. What is Internet homicide?
Internet homicide refers to a killing in which the victim and the criminal met online, in some cases having known each other previously only through the internet, such as in World of Warcraft,Call of Duty, Halo or other online games.

33. What is Cyber stalking?
Cyber stalking is a technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.

34. Give two examples for Cyber stalking? 
1.Empting bank accounts or other economic control such as running the victim's credit score.

2.Harassing family friends and employers to isolate the victim.

35. What is Internet suicide?
Internet suicide is a suicide conducted in full view of the public through the internet, or performance to a cyber suicide pact, which is a suicide pact made between individuals who meet on the internet.

36. Who is an Online predator?
An Online predator is an adult internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes.

37. What is meant by Victimization?
Victimization is the process of being victimised.That means make someone a victim or sacrifice or punish someone unjustly.

38. What is meant by an Advance-fee-fraud?
An Advance-fee-fraud is a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain.

39. What is meant by Federal crime?
Federal crime is a crime that is made illegal by U S federal legislation. A federal crime is one that is prosecuted under federal criminal law, and not under a state's criminal law, where most of the crimes committed in the United States are prosecuted.

40. What is meant by Identity theft?
Identity theft is a form of fraud or cheating of another person's identity in which some one pretends to be some one else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.

41. Define Pedophilia?
Pedophilia is defined as a psychiatric disorder in adults or late adolescents ( persons of age sixteen and above) characterized by a primary or exclusive sexual interest in prepubescent children (generally age thirteen years or younger). The child must be at least five years younger in the case of adolescent pedophiles. 

42. What is meant by Wire fraud?
Wire fraud is any criminally fraudulent activity that has been determined to have involved electronic communications of any kind, at any phase of the event.

43. What is Mail fraud?
Mail fraud is an offense under United States federal law, which includes any scheme that attempts to un lawfully obtain money or valuables in which the postal system is used at any point in the commission of a criminal offense.

44. Define Vishing?
Vishing is the criminal practice of using social influence over the telephone system, most often using features facilitated by Voice over IP (Vo IP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of "Voice" and phishing.

45. What is Caller ID spoofing?
It is the practice of using the telephone network to display a number on the recipient's Caller ID display which is not that of the actual originating station

46. Define Credit card fraud?
Credit card fraud is a wide ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.

47. What is Human Trafficking?
Human Trafficking means the sale, transport and profit from human beings who are forced to work for others. It is equalent to slavery. Against their will many people around the world are forced to work for the profit of others.

48. Give two examples for Human Trafficking?
Begging and prostitution are two examples for Human Trafficking..

49. What is Online gambling?
Online gambling is a type of gambling using the internet.

50. Mention some tips to prevent Cyber Crimes?
1.Read up on the latest ways hackers create phishing scams to gain access to your personal information.

2.Install a fire wall on your computer to keep unwanted threats and attacks to a minimum.

3.Use caution when you consider whether to click on emails, sent files or anything that looks suspicious.

4.Search for websites for a search engine.

5.Install security suit software.

6.Create strong passwords for any websites where personal information is stored.


Subscribe Newsletter
Register to the site for free, and subscribe to the newsletter. You will receive new articles and special content not available elsewhere on the site, right into your e-mail box!