M17 INTERNATIONAL DIMENSION OF CYBERCRIMES

Cards (14)

  • Hacking - this kind of crime entails hacking into someone's computer in order to acquire the private, sensitive, and confidential information, much like breaking and someone's home in the real world.
  • Identity theft - this type of cybercrime involves stealing another person’s identity using their name, address, date of birth, Social Security number, bank account numbers, driver license number, passport number, and other identifying information
  • Electronic funds transfer - occurs when the digital data stored on a card is reproduced once legitimate credit card numbers are obtained, either by hacking or by physically stealing the card
  • Feed hacking - when someone hacks into the camera of their victim's computers,phone,security systems to spy or obtain information
  • Command hacking - is the act of hacking into electronic devices such as microwaves, electronic dolls, electronic ovens and so on. To cause fear, manipulation and in some cases fire
  • Child soliciting and abuse - happens when criminals approach and coerce children through chat rooms in order to get media files afterwards exploited for pornographic reasons
  • Trafficking - while browsing the dark web, one can find markets for many illegal offline "products" that can be obtained through the click of a button without the risk of getting caught
  • Cyberstalking - it refers to harassment via internet where an individual uses online platforms to stalk others with malicious intent.
  • Cyber -bullying - is when all kinds of media devices are used post certain content online for the sole purpose of hurting or embarrassing another person
  • Copyright Theft and Piracy - occurs when a person infringes on copyrights and downloads music etc.
  • Cyber extortion - when a website, email server, or computer system is hack and denied of service by shutting down their system. This hackers sometimes request money in return for promising to stop the attacks or sometimes just want to cause chaos or impairment in operation
  • Dissemination of offensive materials and cyber blackmail - when someone hacks into the private files of their victims and post their private information such as pictures, phone numbers or threaten to post them in exchange for what they desire
  • Theft of service - takes place when the hacker gains access to an organization service such as telecommunication service
  • Cyber terrorism - stem for political motives and triggers individuals to use computers and information technology to cause severe disruption or widespread fear