Cybercrime - is any criminal activity that involves a computer, network device or a network
Cybercrime is Transnational in nature. These crimes are committed without being physically present at the crime location. These crimes are committed in the impalpable world of computer networks
CYBERCRIME CATEGORY
Cybercrimes against persons
Cybercrimes against property
Cybercrimes against government
Malware - where a victims are hit with the worm or virus that renders their devices useless
Maninthemiddle - where a hacker puts himself between a victims machine and a router to sniff data packets
Phishing - where a hacker sends a seemingly legitimate looking email asking users to disclose personal information other types of cyber-attacks
DDoSattacks - are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources.
Botnets - are networks from compromise computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act a smallware and perform malicious tasks
Identitytheft - occurs when a criminal gains access to a user's personal information to steal funds, access confidential information, are participate in tax or health insurance fraud
Cyberstalking - involves online harassment where the user is subjected to a plethora of online message and emails. Cyber stalkers use social media websites , and search engines to intimidate a user and still fear
Socialengineering - involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually post as a customer service agent so you'll give the necessary information needed
potentiallyunwantedprogramspups - are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and free downloaded apps
Phishing - involves hacker sending malicious email attachments or urls to users to gain access to their accounts or computer.
Prohibited/illegal content - involves criminal sharing and distributing inappropriate content that can be considered highly distressing and offensive. Illegal content includes materials advocating terrorism related acts and child exploitation material
Onlinescams - these are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. It includes anything offers that are too good to be true
Exploitkits - needs a vulnerability in order to gain control of a user's computer. They are ready made tools criminals can buy online and use against anyone with a computer