Vous êtes sur la page 1sur 1

Types of internet crimes

Internet crimes are not confined to a particular form but her crimes appeared several other images
vary with the immediate goal in crime.. The main targets of such crimes are as follows: first: the
. manufacture and dissemination of viruses: the most popular and influential Internet crimes
II: breakthroughs: the unauthorized access to computers or computer networks. The bulk of
intrusions (or attempted intrusions) through programs available online and may be a modest
. technical expertise to use them for attacks on others, and therein lies the danger
III: disable hardware: more recently such processes, where the perpetrators to disable hardware or
networks to perform their work without the penetration of those devices. Idle process by sending
an overwhelming number of messages in ways that certain technical devices or networks that you
.want to disable it you are constrained by the performance of its work
IV: identity theft: the crime of using other personal identity illegally, intended either for the use of
that identity (i.e., the identity of the victim) or to hide the identity of the offender to facilitate the
.Commission of other crimes
VA: harassment and prosecution: the prosecution is crime on the Internet often use e-mail or
means of immediate dialogues on the Web. Include prosecution threats, intimidation and
harassment. Consistent prosecution of crimes on the Internet with those outside of the network's
. goals and the desire to control the victim
And offences of harassment and stalking online easily possible offender to conceal his identity in
addition to multiplicity and easy means of communication across the network, which helped in the
. spread of this crime
VI: victimization and grooming: most victims of such crimes are young Web users. Where criminals
purported victims of their wish to form a friendship that may develop into a physical encounter
between the two sides. And the fact that most of the victims are young, many accidents are not
. reported, where many of the victims are not aware that they have been deceived
VII: libel and slander: the offender information may be confidential or erroneous or misleading
about the victim, who may be an individual or a society or Enterprise multiple methods used in this
type of crime, but list these methods create a website containing information to publish or send
.this information via the mailing lists to large numbers of users
VIII: production and dissemination of pornography: the Internet has provided the most effective
and attractive to industry and disseminating porn. The Internet has made porn in various means of
presentation of pictures and videos and dialogues within everyone's reach, and perhaps this was
.the most negative aspects of the Internet

Vous aimerez peut-être aussi