Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Type of Cyber Crime
Cyber Bullying
Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.

Sexting
Sexting is sending and receiving sexual messages through technology such as a phone, app, email or webcam. For some people, sexting is a way to explore sexuality, trust, boundaries and intimacy. However, in some cases, sexting is used to bully, blackmail and exploit. The decision to sext is personal — not everyone feels the same way about it. Most teens decide not to sext. Older teens are more likely than younger teens to send and receive sexts.

Online Game
Online games refer to games that are played over some form of computer network, most often the Internet. Online games can range from simple text-based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously.

Social Media
Social media refers to websites and applications that are designed to allow people to share content quickly, efficiently, and in real-time. Many people define social media as apps on their smartphone or tablet, but the truth is, this communication tool started with computers. The ability to share photos, opinions, events, etc in real-time has transformed the way we live and, also, the way we do business.

Stealing Personal Information
Is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name and perhaps to the other person’s disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
