Recognize the Types of Internet Crime

Recognize the Types of Internet Crime – We can’t just believe in internet security. Currently there are many crimes, especially in the world of networks or the internet. Internet crimes other than hackers are already many and stalking our activities

1. Carding

Carding can be considered as an act of theft, but it is digital. The reason is, carding is a term for illegal shopping activities using other people’s credit card numbers or identities. The perpetrators themselves are called carders.

And it’s even worse that it turns out that Indonesia is the second country after Ukraine with the highest carding crime rate in the world. No half-hearted anymore, 20% of internet transactions from Indonesia is the result of carding.

Therefore, it is not surprising that many online shopping sites in the world block IP addresses from Indonesia. In a sense, blacklisted so that Indonesians cannot shop on the site. The point is Carding is an internet crime that is very detrimental to other people.

Recognize the Types of Internet Crime

2. Defacing

This one internet crime works by changing a website page or another party’s website. Usually due to disappointment, and this is not fatal. In a sense not too harmful. There are several cases of defacing that occur on government websites such as the Minister of Communication and Information, BI, KPU, and many more. Defacing sites can usually be recovered quickly.

Also Read : Easy Ways to Overcome Positive Internet

3. Hacking

Hacking or hacker is an activity of theft of privacy by hacking computer programs belonging to other people or parties. However, even though it is classified as a crime, hacking itself seems to be divided into two categories, namely good and bad. A good hacker is a hacker who observes the security of someone else’s program, if a vulnerability is found, the hacker immediately informs the developer that the application program is not safe and should be repaired immediately.

While bad hackers usually take advantage of security holes for malicious purposes. For example disrupting computer programs, stealing privacy, or taking over an application program.

4. Cracking

Furthermore, Cracking which is concluded as hacking is malicious or destructive. The culprit himself is called a cracker. This crime can be compared to hackers. But if there are hackers who are good, then Cracking tends to be only bad. The point is to steal, rob, and others in cyberspace.