EMTECH

Cards (20)

  • Cybercrime
    Criminal activities carried out using computers, networks, or the internet as a tool
  • Cybercrime is one of the biggest concerns for individuals, businesses, and governments in our generation
  • Cybercriminals
    Individuals or groups that engage in criminal activities, usually operating locally, nationally, or internationally, profiting from the internet's global reach to carry out their crimes
  • Cybercrimes have been known and happening since the last 1830s, before the internet was invented
  • The first cyber-attack happened in France, by breaking into the French telegraph system to obtain financial market data
  • Cybercrime has increased dramatically, characterized by an interesting development of strategies, methods, and practices used for illicit purposes
  • Cybercrime can happen to anyone since cybercriminals can target a wide range of categories including individuals, property, and government entities
  • Phishing- 

    Sending misleading messages, emails, advertisements, and websites to trick people into revealing personal information or data
  • Identity Theft
    Stealing personal information to impersonate individuals for financial gain or other malicious purposes
  • Online Scams
    Using the internet or social media to defraud and take advantage of victims to gain money, often when buying stuff or products online
  • Ransomware
    Malicious malware that encrypts files on a victim's computer or network, demanding payment to decrypt the files
  • Fraudulent Transactions
    Using stolen financial information to make unauthorized purchases or transfers, resulting in financial losses
  • Intellectual Property Theft
    Stealing an individual or organization's concept, works, and inventions and claiming them as their own
  • Crypto Jacking
    Compromising devices to use their resources to "mine" online currencies or money
  • Cybercrime against government
    • Sabotage
    • Election Interference
    • Espionage
  • Sabotage
    Using cyberattacks to stop essential infrastructure functions, including power grids or transportation networks, or government services
  • Election Interference
    Using cyber techniques, such as hacking voter databases or disseminating false information, to try to influence or sabotage the electoral process
  • Espionage
    Infiltrating government networks to gather classified information for blackmail
  • The punishment for cybercrimes is usually imprisonment for a long time or a significant prison sentence
  • To avoid becoming a victim of cybercrime, people should be more careful when opening links and websites, use strong passwords, and not trust others easily with private information