-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcyber.html
More file actions
39 lines (35 loc) · 2.59 KB
/
cyber.html
File metadata and controls
39 lines (35 loc) · 2.59 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
<!DOCTYPE html>
<html>
<head>
<title>CYBER CRIME</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" type="text/css" href="cyber.css">
</head>
<body>
<div class="content">
<h1 ><b><u>**CYBER CRIME**</u></b></h1>
<h4><p>
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".[3] Cybercrime may threaten a person or a nation's security and financial health.[4] Issues surrounding these types of crimes have become high-profile, particularly those regarding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography, and child grooming.[3]
There are many privacy concerns surrounding cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones".[3] Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state is sometimes referred to as cyberwarfare.
</p></h4>
<img src="cy.jfif" class="fake";>
<h2 style="color:black">CLICK BELOW TO REGISTER YOUR COMPLAINT</h2>
<a href="form.html" target="_blank">REGISTER YOUR COMPLAINT.</a>
</div>
<div class="footer">
<p class="footer-links">
<a href="feedback.html"target="_blank">FEEDBACK</a>
|
<a href="#FAQ"target="_blank">FAQ</a>
|
<a href="Webpolicy.html"target="_blank">WEBSITE POLICIES</a>
|
<a href="disclaimer.html" target="_blank">ABOUT</a>
</p>
</div>
<div id="copyright">
© Copyright 2020,ALL RIGHTS RESERVED..
DaTa PiRaTeS :)
</div>
</body>
</html>