CyberCrimes: Classifications

Aug 2021|🟡Review|8 min read|36 entries

Key Takeaway

n this post, we are going to learn about the world of cybercrimes.

Last verified: 12 Feb 2026·Source: www.pscarivukal.com·Next review: Review recommended

I(36)

Hackers are classified into 6 types. They are:White Hat Hackers / Ethical Hackers
They are often government-backed security professionals, information security analysts, penetration testers, and cybersecurity researchers who utilize their expertise to safeguard others.Eg: Tim Berners-Lee(Founder of World Wide Web), Linus Torvalds(Founder of Linux systems), Richard M. Stallman(Founder of the free software project GNU),etcGray Hat Hackers–Hackers who break into systems for sometimes good or sometimes for evil purposes. Their goals are often good, but they do not always use ethical hacking techniques. They are a category that lies between the White hat and the black hat
Black Hat Hackers
They use their knowledge and expertise to gain unauthorized access to computer networks, exploit security flaws, and circumvent security protocols in order to swindle and extort others
Red Hat Hackers
They are known as the Robinhood of Cybersecurity. They use extreme sometimes illegal methods to go against Black Hats and destroy their servers
Blue Hat Hackers
Amateur hackers that hack for personal vengeance(uses doxxing, uploads personal data on public sites, etc.)or security experts who operate outside of the business(performs penetration testing and similar tests to assess vulnerabilities in the organization's cyberspace)
Green Hat Hackers
Amateur hackers trying to master hacking techniques
Script kiddies
They are a subset of green hats who are less interested in studying hacking methods and more interested in obtaining scripts, malware, and other similar tools
Email bombing
Sending massive amounts of email to a certain email address, causing the system to crash
Smurf Attack
The target computer's IP address is first spoofed and then flooded with series of ping messages
Email Spoofing
A hacker sends an email that has been altered to appear to have come from a reliable source like banks
Website/URL Spoofing
When a hacker develops a phony website/URL that appears to be real and the hacker then obtains your credentials when you log in with your username and password.IP Spoofing– It is a type of DDOS attack in which a hacker changes a packet's original IP address to a bogus one
The different types involved are:Spear phishing
a finely crafted email aimed at a specific person
Whaling
very targeted email; targets are generally executives, CEOs of large organizations, etc
Vishing
It is the phishing done by phone/voice calls
Smishing
The target gets an SMS with a link that appears to be a legitimate source like the bank, when you click the link and enter your login details, your data is stolen
Internal phishing
phishing attacks originating from within an organization
Social media phishing
Luring users to click on malicious links in Facebook, Twitter, or other social media posts
Pharming
redirecting users to malicious sites by compromising a DNS cache
Search Engine Phishing
Hackers create their own websites, which are then be indexed by the search engines and used to lure online shoppers with unbelievable offers and deals. When the shoppers click the buy link, they will be requested to input their bank information, and their data will be hijacked
Salami Attacks:Tiny attacks that pile up to one large attack that can go unnoticed, with the hacker siphoning out small quantities of money, which is most commonly found in the financial industry.📝Read More:Cyber Laws & Cyber Security | Part IIPrevious Year PSC Questions on Cyber Crimes & Cyber Security📝SideNotes:World Computer Security Day
November 30
World Intellectual Property Day
April 26
First Computer in India was installed at
Indian Statistical Institute, Calcutta (1955)
Internet services were launched in India
August 15, 1995 (by Videsh Sanchar Nigam Limited)
Father of Cybersecurity
Bob Thomas
Father of Cyber Criminology
Karuppannan Jaishankar
First Cyber Forensic Laboratory
Tripura
First cybercrime in the World was registered against
Joseph Marie Jacquard
First cybercrime in India was registered against
Arif Asim
First Cyber Police Station in India
Bangalore
The first cyber police station in Kerala was in
Pattom, Thiruvananthapuram (2009).(Previous PSC Questions:Executive Officer Grade IV, Malabar Devasom Board, 2018)The Asian school of cyber laws is situated in –Pune(Maharashtra)
Cyber State of India
Andhra Pradesh
First Cyber Post Office in India
Chennai
First Cyber crime Prevention Unit in India
AASHVAST (Gandhinagar, Gujarat)
Inaugrated on*
10 January 2020.a helpline for the cyber crime victims
The district with the highest number of cyber crimes reported in Kerala in the year 2023
Malappuram (26 cases)
Introductory Approach'
Raju Narayanaswami
The newly appointed national brand ambassador of the Indian Cyber Crime Coordination Centre (14C) in 2024
Rashmika Mandanna

* Time-sensitive data — verify for latest information