M13 NATURE AND CONCEPTS OF CYBERCRIME

Cards (16)

  • Cybercrime - is any criminal activity that involves a computer, network device or a network
  • Cybercrime is Transnational in nature. These crimes are committed without being physically present at the crime location. These crimes are committed in the impalpable world of computer networks
  • CYBERCRIME CATEGORY
    1. Cybercrimes against persons
    2. Cybercrimes against property
    3. Cybercrimes against government
  • Malware - where a victims are hit with the worm or virus that renders their devices useless
  • Man in the middle - where a hacker puts himself between a victims machine and a router to sniff data packets
  • Phishing - where a hacker sends a seemingly legitimate looking email asking users to disclose personal information other types of cyber-attacks
  • DDoS attacks - are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources.
  • Botnets - are networks from compromise computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act a smallware and perform malicious tasks
  • Identity theft - occurs when a criminal gains access to a user's personal information to steal funds, access confidential information, are participate in tax or health insurance fraud
  • Cyberstalking - involves online harassment where the user is subjected to a plethora of online message and emails. Cyber stalkers use social media websites , and search engines to intimidate a user and still fear
  • Social engineering - involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually post as a customer service agent so you'll give the necessary information needed
  • potentially unwanted programs pups - are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and free downloaded apps
  • Phishing - involves hacker sending malicious email attachments or urls to users to gain access to their accounts or computer.
  • Prohibited/illegal content - involves criminal sharing and distributing inappropriate content that can be considered highly distressing and offensive. Illegal content includes materials advocating terrorism related acts and child exploitation material
  • Online scams - these are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. It includes anything offers that are too good to be true
  • Exploit kits - needs a vulnerability in order to gain control of a user's computer. They are ready made tools criminals can buy online and use against anyone with a computer