Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Cyber Squatters registers domain name identical to popular service provider’s domain so as to attract their users and get benefit from it. Cyber Terrorism:- Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Cyberterrorism is more anonymous than traditional terrorist methods. Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami. E-commerce/ Investment Frauds:- Sales and Investment frauds.Distributed DOS A distributed denial of service (Do S) attack is accomplished by using the Internet to break into computers and using them to attack a network.Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website.Information posted to a bulletin board can be accessed by anyone.This means that anyone can place Cyber defamation is also called as Cyber smearing.
Types of DOS There are three basic types of attack: a. Destruction or Alteration of Configuration Information c.