Last updated on August 14, 2021
Here, it is a small introduction of cyber frauds stated in the previous post.
Cyberstalking : Cyberstalking is the use of the Internet, email or other electronic communications to stalk or harass a group of individuals, or an organization, and generally refers to a pattern of threatening or malicious behaviors. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. Cyberstalking may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm.
Source: The National Conference of State Legislatures (NCSL) & wikipedia
Cyber harassments: Cyber harassment differs from cyberstalking in that it may generally be defined as not involving a credible threat. Cyber harassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual.
Source: The National Conference of State Legislatures (NCSL)
Cyberbullying : The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature:
Source: online oxford dictionary definition http://www.oxforddictionaries.com/definition/english/cyberbullying
Cyber attacks: Cyber attacks, also referred as cyberwarfare or cyberterrorism in specific situations, is a type of offensive maneuver employed by both individuals and whole organizations that target computer information systems, infrastructures, computer networks, and/ or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
Source: Wikipedia http://en.wikipedia.org/wiki/Cyber-Attacks
Phishing : Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public
Spam: Unsolicited or undesired electronic messages
Infringement Intellectual property: An intellectual property infringement is the infringement or violation of an intellectual property right.
Online Sexual harassment/ abuse: This is bullying or coercion of a sexual nature or the unwelcome or inappropriate promise of rewards in exchange for sexual favors through online.