Cybercrime is simply any criminal activity committed using computers, the internet and digital devices. it either attack networks and computer systems or uses the systems and networks as enabling tools for committing crimes.Cybercriminals devise various strategies and programs to attack computers and systems.
Computer related and Internet fraud, Romance scam, Hacking, Identity theft,Phishing, Child Sexual Exploitation, Malware Attacks, Business Email Compromise(BEC),Cyberstalking, Cyberbulling etc are some of the most common types of cybercrime perpertrated by cybercrimnals.

1.Computer Related/Internet Fraud

Internet fraud is a type of fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Fraud can be done by altering, destroying, stealing, or suppressing any information to secure unlawful or unfair gain.

2. Romance Scam

A romance scam is a confidence trick involving feigning romantic intentions towards a victim,gaining their affection, and then using that goodwill to commit fraud. Fraudulent acts may involve access to the victim's money, bank accounts, credit cards, passports, e-mail accounts, or national identification numbers; or forcing the victims to commit financial fraud on their behalf.

3. Hacking

Hacking is a criminal activity that intrudes or break into systems to steal sensitive information such as personal banking details, corporate financial data etc or to acquire and take control of certain functions within a system, network, or website.

4. Identity Theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss. This form of fraud occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

5. Phishing

Phishing is a cybercrime in which targets are contacted through email or text message by an indivitual or group of persons posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.The information is then used to access important accounts and can result in identity theft and financial loss.

6. Child Sexual Exploitation

Child sexual Exploitation is a cybercrime that exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a child or it may be simulated child pornography. Abuse of the child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, sculpture, drawing, cartoon, painting, animation, sound recording, film, video, and video games.

7. Malware Attacks

A malware attack is a criminal activity whereby cybercriminals create malicious software that’s installed on someone else’s device without their knowledge to gain access to personal information or to damage the device, usually for financial gain. Different types of malware include viruses, spyware, ransomware, and Trojan horses and it can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.

8. Business Email Compromise(BEC)

Business email compromise attacks (BEC) are a form of cyber crime which use email fraud to attack commercial, government and non-profit organizations to achieve a specific outcome which negatively impacts the target organization. An attack usually targets specific employee roles within an organization by sending a spoof email (or series of spoof emails) which fraudulently represent high level employees (CEOs and the like) or a trusted customer, with instructions, such as approving payments or releasing client data and in the process trick the victim into making money transfers to the bank account of the fraudster.

9. Cyber Stalking

This is a form of cybercrime in which the victim is subjected to online harassment in forms of a barrage of online messages and emails with the aim of making the victim miserable.

10. Cyber Bullying

Cyber bullying is similar to cyber stalking, however, the barrage of messages can be harmful, abusive, and wholly offensive. it can also be done by posting images and videos online that will offend the victims. It can also be excluding people online, creating fake accounts to post harmful or distressing content, and again sending abusive messages.