- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What is Cyber Crime and Mobile Security Threat?
A cyber-crime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc. This type of crime is carried out using technology which primarily takes place online.
Some cyber-crime includes the following −
Harassment
Cyber-stalking
Bullying
Types of Cyber-crimes
The types of cyber crimes are as follows −
Hacking
It is a type of cyber crime in which a person tries to identify and exploit weakness in a computer system or a computer network for his own benefits.
Some types of hacking are given below −
Social Engineering & Phishing
Malware-Injecting Devices
Cracking Passwords
Distributed Denial-of-Service
Virus dissemination
Virus dissemination is a process in which a Malicious software attaches itself to other software (which can be a trojan horse, time bond, virus , worm etc) which has the ability to destroy the victim computer/system.
Cyber Terrorism
Cyber terrorism is a type of attack in which a person uses the Internet to establish violent acts which may result in loss of a life, harm to a person or threaten to life. The main object of this is to gain political advantages by the use of threat.
Computer Vandalism
Computer Vandalism is a type of process in which a program has the ability to perform malicious tasks such as getting someone’s passwords or important data. This can even include the removal of user data or deleting one's hard drive.
Security Threats
Now, let us see the Security threats related to mobile devices, which are as follows −
Data Leakage
Unsecured Wi-Fi
Network Spoofing
Phishing Attacks
Spyware
Broken Cryptography
Improper Session Handling
Let us discuss each threat in detail.
Unsecured Wi-Fi
Free wi-fi is easily attractive to people, if anyone connects to the free wifi, then the hackers might steal your data. Never use the free wifi when accessing confidential services like banking and transactions, there might be a chance of stealing your money.
Phishing Attacks
Phishing attacks are mostly seen in emails and messages. When the user clicks on a suspicious link, there might be a chance of virus files download which can corrupt and hack your devices which results in data loss. In some cases, they will send a form to fill in the confidential information.
Malicious Apps and websites
When you download any app manually from the websites, there might be a chance that the app can accomplish some objectives like stealing data, encrypting the data, etc.
Weak Passwords
If the passwords of the mobile devices are weak there might be a change of others accessing the data. This might result in data leakage and privacy issues. So make sure that the passwords for mobile devices or apps must be strong.
Iot Mobile security threats
As we all know most of the things are correcting to the internet and works easily, fast with the internet from wearable tech like smartphones, watches, etc. If these devices are hacked then misuse of these devices might result in huge costs.
- Related Articles
- What is Cyber Security and Cyber Crimes?
- Cyber Security & the Threats of Mobile Devices
- What is meant cyber crime? What are its different types?
- What is the difference between Software Security and Cyber Security?
- What is Cyber Security and what are its types?
- What is Scavenging in Cyber Security?
- What is the difference between Cryptography and Cyber Security?
- What is Mobile Database Security in information security?
- What is Intrusion Detection in Cyber Security?
- How effectively is the Indian government dealing with cyber crime?
- How to Conduct a Cyber Threat Analysis?
- Difference between Cyber Security and Information Security
- What is Angler Exploit Kit in Cyber Security?
- How is Cloud Misconfiguration a Major Security Threat?
- What Are Logic Bombs in Cyber Security?
