Page 355 - Web_Application_v2.0_C12_Fb
P. 355

Ð ÐSense of Urgency: Messages often create pressure or urgency, such as claiming your account is at risk,
                    requiring immediate action, or presenting an attractive offer.

                 Ð ÐDeceptive Links or Attachments: These messages include links or attachments that appear genuine but
                    redirect to fake phishing websites designed to mimic legitimate sites.

                 Ð ÐHarvesting Sensitive Data: Once you input your information on the fraudulent website, it is captured by
                    the attacker and exploited for purposes like financial fraud or identity theft.

                 Cyberstalking

                 Cyberstalking is a form of cybercrime where the internet and technology are
                 used to harass or stalk individuals, groups, or organisations, instilling fear in
                 the victim. Common behaviors of cyberstalkers include:
                 Ð ÐTracking personal information: Gathering and misusing private details
                    to intimidate the victim.

                 Ð ÐExcessive communication: Sending incessant messages, such as texting
                    hundreds of times a day, to assert control or frighten the target.

                 Ð ÐSocial media monitoring: “Creeping” on the victim’s social media accounts to track their whereabouts
                    and potentially appear uninvited in physical locations.

                 Ð ÐOnline posting: Sharing content about the victim without their permission, which can include spreading
                    rumors or false information.

                 The stalker may be someone familiar to the victim or a complete stranger, making it a deeply invasive and
                 distressing experience.

                                                 Identity Theft

                                                 Identity Theft is a cybercrime where an individual’s personal
                                                 information — such  as  their  name,  Aadhaar  number,  email,  phone
                                                 number, or financial details—is stolen and used fraudulently to commit
                                                 crimes in their name. This misuse often aims to harm the victim’s reputation
                                                 or for financial exploitation. Examples of identity theft include:
                                                 Ð ÐOpening fraudulent accounts: Such as credit cards or bank accounts
                                                    in the victim’s name.

                 Ð ÐMaking unauthorised purchases: Using stolen financial details to buy goods or services.
                 Ð ÐWithdrawing money: Illegally accessing and depleting the victim’s bank accounts.

                 Victims of identity theft may experience significant emotional distress, including stress, anxiety, and even
                 depression, due to the privacy breach and the complexities of resolving such incidents.

                 Malware Attacks

                 Malware Attacks  involve deploying  malicious software  (malware)  to
                 damage, disrupt, or gain unauthorised access to computer systems, servers,
                 or networks. These attacks can be perpetrated by individuals,  criminal
                 organisations, or even  state actors.





                                                                                          Cyber Safety and Security  353
   350   351   352   353   354   355   356   357   358   359   360