Hacking - this kind of crime entails hacking into someone's computer in order to acquire the private, sensitive, and confidential information, much like breaking and someone's home in the real world.
Identitytheft - this type of cybercrime involves stealing another person’s identity using their name, address, date of birth, Social Security number, bank account numbers, driver license number, passport number, and other identifying information
Electronicfundstransfer - occurs when the digital data stored on a card is reproduced once legitimate credit card numbers are obtained, either by hacking or by physically stealing the card
Feedhacking - when someone hacks into the camera of their victim's computers,phone,security systems to spy or obtain information
Commandhacking - is the act of hacking into electronic devices such as microwaves, electronic dolls, electronic ovens and so on. To cause fear, manipulation and in some cases fire
Childsolicitingandabuse - happens when criminals approach and coerce children through chat rooms in order to get media files afterwards exploited for pornographic reasons
Trafficking - while browsing the dark web, one can find markets for many illegal offline "products" that can be obtained through the click of a button without the risk of getting caught
Cyberstalking - it refers to harassment via internet where an individual uses online platforms to stalk others with malicious intent.
Cyber-bullying - is when all kinds of media devices are used post certain content online for the sole purpose of hurting or embarrassing another person
Copyright TheftandPiracy - occurs when a person infringes on copyrights and downloads music etc.
Cyberextortion - when a website, email server, or computer system is hack and denied of service by shutting down their system. This hackers sometimes request money in return for promising to stop the attacks or sometimes just want to cause chaos or impairment in operation
Dissemination of offensivematerials and cyberblackmail - when someone hacks into the private files of their victims and post their private information such as pictures, phone numbers or threaten to post them in exchange for what they desire
Theft of service - takes place when the hacker gains access to an organization service such as telecommunication service
Cyberterrorism - stem for political motives and triggers individuals to use computers and information technology to cause severe disruption or widespread fear