Skip to main content

Cyber crime and cyber rules

Cyber crime :- 

Cyber crime is the use of computers and get networks to perform illegal activities such as spreading computer viruses / trojans, online bulling, performing unauthorized electronic fund transfer, etc.most cyber crimes are committed through internet. Some cyber crimes can also be carried out using mobile phones via SMS and online chatting applications. 
There are many cyber crimes some of them are:- 
  • Computer fraud
  • Privacy violation
  • Identity theft
  • ATM fraud
  • Sharing copyright files and information
  • Electronic fund transfer
  • Spam
  • Electronic money laundering
  • Denial of service attacks.

Rules for ethical hacking :-

  • Get written permission from the owner of computer system before hacking.
  • Protect the privacy of the organization been hacked.
  • Transparently report all the identified weaknesses in the computer system to the organization.
  • Inform hardware and software venders of the identified weaknesses
Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking.

Comments

  1. This is a smart blog. I mean it. You have an excellent knowledge about this topic. Thanks for sharing such a great blogs to us. Hire a professional hacker

    ReplyDelete
  2. I am really impressed by the way you detailed everything. It’s very informative and you are obviously very knowledgeable in this field. It’s a great pleasure reading your post. It’s useful information. Thanks for sharing such an amazing post. Ethical Hacker For Hire

    ReplyDelete

Post a Comment

Popular posts from this blog

Ethical hacking

Ethical Hacking What is hacking Don't know  Click here There are some programming languages which are most important for Ethical Hacking without any external sofwares. Make software / program. Go into system. and Hack them. There are some programming languages that you must learn to become a professional hacker  That programming languages are :- Click here to know that programming languages.

Scheduling Static & Dynamic Deterministic & stochastic feasible & Infeasible Parallel & sequential

IBFS by LCM