Feedback / Suggestions


Any criminal activity that uses a computer either as an instrumentality, target, or a means for perpetuating further crimes comes within the ambit of cybercrime. The term “cyber-crime” is not defined under the Information Technology Act, 2000. In simple terms, cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. It is also known as computer crime, e-crime, and electronic crime.

Cybercrimes can be classified into 3 major categories as

a) Crime against the government such as cyber terrorism.

b) Crime against persons such as cyber pornography, cyberstalking, cyber defamation

c) Crime against property such as online gambling, intellectual property infringement, phishing, credit card frauds.

There are various modes or methods by which cybercrime can be committed such as Unauthorized access to computer systems or networks / Hacking Theft of information contained in electronic form

  1. Email bombing
  2. Data diddling
  3. Salami attack
  4. Denial of Service attack
  5. Virus/worm attacks
  6. Logic bombs
  7. Internet time theft

Phishing is the criminal and fraudulent act of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity or person in an electronic communication. Communications purporting to be from popular social websites, auction sites, online payment processors, or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel is almost identical to the legitimate one.

Cybersquatting is the practice by means of which a person or legal entity books up the trademark, business name, or service mark of another as his own domain name for the purpose of holding on to it and thereafter selling the same domain name to the other person for valuable premium and consideration. Cyber squatters book up domain names of important brands in the hope of earning quick millions.

This occurs when defamation takes place with the help of computers and/or the Internet. E.g. someone publishes defamatory matters about someone on a website or sends e-mails containing defamatory information.

This term is derived from the term hijacking. In these kinds of offenses, the hacker gains access and control over the website of another. He may even change the information on the site. This may be done for fulfilling political objectives or for money.

When negligible amounts are removed and accumulated into something larger. This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.

Hacking is amongst the gravest Cybercrimes known to date. In simple terms, it means an illegal intrusion into a computer system and/or network. Every act committed to breaking into a computer and/or network is hacking. Some hackers hack for personal monetary gains, such as stealing credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. The offense is punishable under Section 66 of the IT Act,2000.

Financial Crimes are defined as a crime against property, involving the unlawful conversion of the ownership of property (belonging to one person) to one’s own personal use and benefit. There are many different ways that these crimes can be committed, for instance by mail, fax, telephone, and the Internet. By using social engineering techniques or sophisticated technical methods such as “phishing”, fraudsters are able to plunder bank accounts across the world. Victims range from individuals to institutions, corporations, governments, and entire economies.

Cyberstalking, which is simply an extension of the physical form of stalking, is where electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion. Most often, given the vast distances that the Internet spans, this behavior will never manifest itself in the physical sense but this does not mean that the pursuit is any less distressing. There are a wide variety of means by which individuals may seek out and harass individuals even though they may not share the same geographic borders, and this may present a range of physical, emotional, and psychological consequences to the victim.

Cyber terrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

• Read the latest ways hackers create phishing scams to gain access to your personal information.

• Install a firewall on your computer to keep unwanted threats and attacks to a minimum.

• Use caution while opening emails and clicking links. You should read carefully while downloading content from unverified sources.

• Create strong passwords for any websites where personal information is stored

The IT Act of India states that when cybercrime has been committed it shall have global jurisdiction. Hence, a complaint can be filed at any cyber cell/police station situated in your city or elsewhere. It is advisable to always approach a cyber cell that is closer to your place for better access.

Last Updated: 30-07-2021 11:56 AM Updated By: Admin

Disclaimer :

Please note that this page also provides links to the websites / web pages of Govt. Ministries/Departments/Organisations.The content of these websites are owned by the respective organisations and they may be contacted for any further information or suggestion

Website Policies

  • Copyright Policy
  • Hyperlinking Policy
  • Security Policy
  • Terms & Conditions
  • Privacy Policy
  • Help
  • Screen Reader Access
  • Guidelines


  • Last Updated​ :
  • Visitors Counter :
  • Version :
Designed, Developed and Hosted by: Center for e-Governance - Web Portal, Government of Karnataka © 2024, All Rights Reserved.

Best viewed in Chrome v-87.0.4280.141, Microsoft Edge v-87.0.664.75, Firefox -v-83.0 Browsers. Resolution : 1280x800 to 1920x1080