Top facts of Cyber Crime

Cyber crime is also known from computer crime. It involves computer and the network from which computers are connected. Behind cyber crime, there are some criminal motives like to ensure personal information such as bank password, bank account numbers etc. This crime takes place with the help of modern communication networks (such as chat rooms, email, notice boards, and groups) and mobile phones (SMS/MMS). Maximum cyber crime leads to threatening a nation’s security and financial health of that nation. To detect person behind it is  complicated so it needs a special technical skilled full person. The criminal of cyber crime we can say the master of networking….! Is it correct or not ? obviously, it is correct because without knowing the knowledge of networking no one can do this. Following are some unknown terminology related to it.

(1) Cyberstalking

Cyberstalking is the use of the Internet or electronics to stalk or harass an individual, an organization or a specific group.It includes harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them. As an example, it is put in recording on victim’s computer or  mobile phone in order to save the keystroke so that stacker able to get its personal information. Due to this reason, many banking companies gives the facility of the online keyboard on their website for online transaction.

(2) Identity theft

Identity theft is a form of stealing someone’s personal information and representing to be that person in order to obtain financial resources or other benefits in that person’s name without their permission. Identity theft is considered a cyber crime.

(3) Computer viruses

A computer virus is a computer program that makes its own infinite copy when we open the folder by itself without the user’s permission. The virus may steal disk space, access personal information, ruin data on the computer or send information out to the other computer user’s personal contacts. The most common way is an email attachment. When we open attachment then it automatically starts making its own copy on computer’s hard disk.