What Is Cyber Crime? - Definition, Types & Examples

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: The Concept & Cost of Victimization in Criminal Justice

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
Your next lesson will play in 10 seconds
  • 0:02 Cyber Crimes
  • 0:20 Computer Viruses
  • 2:03 Cyberstalking
  • 3:23 Identity Theft
  • 4:44 Phishing Scams
  • 6:05 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Speed Speed

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Jennifer Williams

Jennifer has taught various courses in U.S. Government, Criminal Law, Business, Public Administration and Ethics and has an MPA and a JD.

In this lesson, we will learn about cyber crimes. We will look at what these crimes are and what they mean. Then, we will take a closer look at some specific examples.

Cyber Crimes

Cyber crimes are any crimes that involve a computer and a network. In some cases, the computer may have been used in order to commit the crime, and in other cases, the computer may have been the target of the crime.

Computer Viruses

Computer viruses are computer programs that, when opened, put copies of themselves into other computers' hard drives without the users' consent. Creating a computer virus and disseminating it is a cyber crime. The virus may steal disk space, access personal information, ruin data on the computer or send information out to the other computer user's personal contacts.

The most common way for a virus to infect a computer is by way of an email attachment. An example would be if you received an email with an attachment. You open this attachment, and the virus immediately spreads through your computer system. In some cases, if the virus is opened by a computer on a system network, such as your place of employment, the virus can immediately be spread throughout the network without needing to be sent via email.

There are numerous reasons that a person would create a virus to send out to another computer or computers. It may be to steal information or money, to sabotage that system or to demonstrate the flaws that the other computer system has. In some cases these viruses are able to be removed from the user's computer system, and in some cases they are not. Therefore, it is easy for us to understand how these viruses cause significant financial harm every year. The punishment for those who damage or gain unauthorized access to a protected computer can be prison time and the repayment of financial losses.


Cyberstalking is the use of the Internet or electronics to stalk or harass an individual, an organization or a specific group. There are many ways in which cyberstalking becomes a cyber crime. Cyberstalking can include monitoring someone's activity realtime, or while on the computer or device in the current moment, or while they are offline, or not on the computer or electronic device. Cyberstalking becomes a crime because of the repeated threatening, harassing or monitoring of someone with whom the stalker has, or no longer has, a relationship.

Cyberstalking can include harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them. An example of cyberstalking would be to put a recording or monitoring device on a victim's computer or smartphone in order to save every keystroke they make so that the stalker can obtain information. Another example would be repeatedly posting derogatory or personal information about a victim on web pages or social media despite being warned not to do so. Cyberstalking has the potential punishment of a prison sentence.

Identity Theft

Identity theft is a form of stealing someone's personal information and pretending to be that person in order to obtain financial resources or other benefits in that person's name without their consent. Identity theft is considered a cyber crime. The personal information stolen can include the person's name, social security number, birth date or credit card numbers. This stolen information is then used to obtain new credit cards, access bank accounts or obtain other benefits, such as a driver's license.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account