The use of a computer as an instrument to further illegal ends
Cybercriminal
A person who uses their skills in technology to do malicious acts and illegal activities known as cybercrimes
Types of cybercrimes
Individual cyber crimes
Organisation cyber crimes
Property cybercrimes
Society cybercrimes
Individual cyber crimes
Targeting individuals, includes phishing, spoofing, spam, cyberstalking, and more
Organisation cyber crimes
The main target is organizations, usually done by teams of criminals including malware attacks and denial of service attacks
Property cybercrimes
Targeting property like credit cards or even intellectual property rights
Society cybercrimes
The most dangerous form, includes cyber-terrorism
Phishing
A type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information
Identity theft
When a cybercriminal uses another person's personal data like credit card numbers or personal pictures without their permission to commit a fraud or a crime
Ransomware attack
A type of malware that prevents users from accessing their personal data by encrypting it and demanding a ransom to decrypt it
Hacking/Misusing computer networks
Unauthorized access to private computers or networks and misuse of it either by shutting it down or tampering with the data
Cyber bullying
Sending or sharing harmful and humiliating content about someone else online
Cyber stalking
Unwanted persistent content from someone targeting other individuals online with the aim of controlling and intimidating
Software piracy
The illegal use or copy of paid software with violation of copyrights or license restrictions
Social media frauds
The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or sending intimidating or threatening messages
Online drug trafficking
The use of cryptocurrency technology to transfer money in a secured private way and complete drug deals without drawing the attention of law enforcement
Electronic money laundering
Also known as transaction laundering, it is based on unknown companies or online business that makes approvable payment methods and credit card transactions but with incomplete or inconsistent payment information for buying unknown products
Cyber extortion
The demand for money by cybercriminals to give back some important data they've stolen or stop doing malicious activities such as denial of service attacks
Intellectual-property infringements
The violation or breach of any protected intellectual-property rights such as copyrights and industrial design
Online recruitment fraud
Fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data
Illegal access
Unauthorized access (without right) to a computer system or application
Illegal interception
Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system
Data interference
Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses
System interference
Unauthorized hindering or interference with the functioning of a computer
Misuse of devices
The unauthorized use, possession, production, sale, procurement, importation
Cyber-squatting
Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same
Computer-related forgery
Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered
Computer-related fraud
Unauthorized input, alteration, or deletion of computer data or program
Cybersex
Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration