Cyber Crime | Types | Complaint Filing

Reading Time: 2 minutes

How to File a Cyber Crime Complaint?

cyber crime
cyber crime

Cyber crime, The internet technology is changing day by day and it made man depend on the internet for all his needs. Now one can access everything with a click while sitting in one place. Internet net is used almost everywhere in the world. India has an important position in the usage of internet. Internet usage also increased the cyber crimes. Cyber crimes are doing in different forms. In India, the number of cybercrime cases is increased by day by day.



WHAT ARE CYBER CRIMES

Cyber crime is the unlawful acts where the computer is used either as a tool or as a target or both. Examples are phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses and so on

Types of Cybercrime

It can be defined in two ways:

1. The computer as a target. For example hacking, virus attacks, DOS attack etc.

2. The computer is used as a weapon for the crime. Examples like cyber terrorism, IPR violations, credit card frauds, EFT frauds, pornography etc.

Some of the cyber crimes are listed below

Unauthorized Access and Hacking

Web Hijacking

Pornography

Child Pornography

Phishing

Salami attacks

Software Piracy

Cyber Stalking

Virus attacks

Email spoofing

Sale of illegal articles

How can you file a cyber crime complaint?

You need to provide name, Email address and telephone number along with an application letter addressing the head of a cybercrime investigation cell when you write the complaint.

You need to provide some certain documents in order to register the complaint.

The documents and information you needed to produce are:-

In the case of hacking, you must provide

Soft copy and hard copy of the web page that is hacked
Server logs

Details about the access to the computer or Email

If the victim has any suspicion of anyone, then their details

The answers to the following question

When was the system compromised?

Where is the impact of the attack-identifying the target system from the network?

Who might have compromised the system?

What is compromised?

How many systems have been compromised by the attack?

Why might have been the system compromised?

In the case of e-mail abuse, you must provide the extended headers of offending e-mail and the offending e-mail from.

The cybercrime is an offense according to Indian IT Act under Indian Cybercrime Law.




Read About: Bitcoin

4Shares

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.