What is Cyber Security and Cyber Crimes?

Cybercrime is any type of illegal activity that takes place via digital means. Data theft is, of course, one of the most common types of cybercrime, but cybercrime also includes a wide range of malicious activity as well, such as cyberbullying or planting worms or viruses.

Cybercrimes are divided into two different categories as follows −

  • Those that cause intentional damage

  • Those that can cause unintentional damage.

A cybercrime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc.

This type of crime is carried out using technology which primarily takes place online.

Some cybercrime even include the following −

  • Harassment

  • Cyber-stalking

  • Bullying

Types of Cyber Crimes

The different types of cyber crimes are as follows −


It is a type of cyber-crime in which a person tries to identify and exploit weakness in a computer system or a computer network for his own benefits.

Some types of hacking are as follows −

  • Social Engineering & Phishing

  • Malware-Injecting Devices

  • Cracking Passwords

  • Distributed Denial-of-Service

Virus dissemination

Virus dissemination is a process in which malicious software attaches itself to other software (which can be a trojan horse, time bomb, virus, worm etc) which has the ability to destroy the victim computer/system.

Cyber Terrorism

Cyber terrorism is a type of attack in which a person uses the Internet to establish violent acts which may result in loss of a life, harm to a person or threaten to life. The main object of this is to gain political advantages by the use of threat.

Computer Vandalism

Computer Vandalism is a type of process in which a program has the ability to perform malicious tasks such as getting someone’s passwords or important data. This can even include the removal of user data or deleting one's hard drive.

Cyber Security

Cyber security is a technique of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

For example − There is a marked increase in phishing attacks. Phishing is of two types--one which is targeted at selected individuals, called spear phishing, who may be of high net worth, while the other is done at a mass scale.

Advantages of cyber security

The advantages of cyber security are as follows −

  • Minimizes computer freezing and crashes.

  • Protection against data from theft.

  • Protects the computer from being hacked.

  • Protects systems against viruses, worms, spyware and other unwanted programs.

Disadvantages of cyber security

The disadvantages of cyber security are as follows −

  • It will be costly for average users.

  • Firewalls can be difficult to configure correctly.

  • Need to keep updating the new software in order to keep security up to date. Make the system slower than before.

  • Difficult to work with for non-technical users.

Types of cyber security

The types of Cyber Security are as follows −

Infrastructure security

It involves security of physical systems used with cyberspace. It includes an electricity grid, etc. These types of resources are made vulnerable when they are connected to the internet. It requires a contingency plan and resilience plan for the infrastructure.

Application security

It involves protection of applications in the system. There are software/hardware methods used to handle threats related to external and internal security of the applications. There are different ways to ensure security here such as firewalls, antivirus, encryption programs, etc.

Network security

It is used to protect the network and its resources as well as nodes in it. It is implemented by the use of different passwords, extra logins, firewalls, monitoring, etc. Machine learning is also used for traffic management and other threat alerts in the network in the real time.

Cloud security

As more and more data is migrated to the cloud, its security is also important. There are new tools and implementations. When data is stored on the cloud, half control of data is given to the cloud provider. It is important to include security considerations in the terms and conditions document. The access to the cloud should also be given to a few trustworthy people.

IoT security

IoT security deals with security of sensors, printers, routers, cameras, etc. The IoT market is in use in embedded systems as well. It is important that vendors keep updating their knowledge about threats related to IoT and other challenges.