Page 355 - Web_Application_v2.0_C12_Fb
P. 355
Ð ÐSense of Urgency: Messages often create pressure or urgency, such as claiming your account is at risk,
requiring immediate action, or presenting an attractive offer.
Ð ÐDeceptive Links or Attachments: These messages include links or attachments that appear genuine but
redirect to fake phishing websites designed to mimic legitimate sites.
Ð ÐHarvesting Sensitive Data: Once you input your information on the fraudulent website, it is captured by
the attacker and exploited for purposes like financial fraud or identity theft.
Cyberstalking
Cyberstalking is a form of cybercrime where the internet and technology are
used to harass or stalk individuals, groups, or organisations, instilling fear in
the victim. Common behaviors of cyberstalkers include:
Ð ÐTracking personal information: Gathering and misusing private details
to intimidate the victim.
Ð ÐExcessive communication: Sending incessant messages, such as texting
hundreds of times a day, to assert control or frighten the target.
Ð ÐSocial media monitoring: “Creeping” on the victim’s social media accounts to track their whereabouts
and potentially appear uninvited in physical locations.
Ð ÐOnline posting: Sharing content about the victim without their permission, which can include spreading
rumors or false information.
The stalker may be someone familiar to the victim or a complete stranger, making it a deeply invasive and
distressing experience.
Identity Theft
Identity Theft is a cybercrime where an individual’s personal
information — such as their name, Aadhaar number, email, phone
number, or financial details—is stolen and used fraudulently to commit
crimes in their name. This misuse often aims to harm the victim’s reputation
or for financial exploitation. Examples of identity theft include:
Ð ÐOpening fraudulent accounts: Such as credit cards or bank accounts
in the victim’s name.
Ð ÐMaking unauthorised purchases: Using stolen financial details to buy goods or services.
Ð ÐWithdrawing money: Illegally accessing and depleting the victim’s bank accounts.
Victims of identity theft may experience significant emotional distress, including stress, anxiety, and even
depression, due to the privacy breach and the complexities of resolving such incidents.
Malware Attacks
Malware Attacks involve deploying malicious software (malware) to
damage, disrupt, or gain unauthorised access to computer systems, servers,
or networks. These attacks can be perpetrated by individuals, criminal
organisations, or even state actors.
Cyber Safety and Security 353

