Cybercrime: Intentionally Harm The
Cybercrime: Intentionally Harm The
Cybercrime: Intentionally Harm The
Categories of Cybercrime
There are three major categories that cybercrime falls into: individual, property
and government. The types of methods used and difficulty levels vary depending
on the category.
Property: This is similar to a real-life instance of a criminal illegally
possessing an individual’s bank or credit card details. The hacker steals a
person’s bank details to gain access to funds, make purchases online or run
phishing scams to get people to give away their information. They could
also use a malicious software to gain access to a web page with confidential
information.
Individual: This category of cybercrime involves one individual distributing
malicious or illegal information online. This can include cyberstalking,
distributing pornography and trafficking.
Types of Cybercrime
DDoS Attacks
These are used to make an online service unavailable and take the network down
by overwhelming the site with traffic from a variety of sources. Large networks of
infected devices known as Botnets are created by depositing malware on users’
computers. The hacker then hacks into the system once the network is down.
Botnets
Identity Theft
Cyberstalking
This kind of cybercrime involves online harassment where the user is subjected to
a plethora of online messages and emails. Typically cyberstalkers use social
media, websites and search engines to intimidate a user and instill fear. Usually,
the cyberstalker knows their victim and makes the person feel afraid or
concerned for their safety.
Social Engineering
Social engineering involves criminals making direct contact with you usually by
phone or email. They want to gain your confidence and usually pose as a
customer service agent so you’ll give the necessary information needed. This is
typically a password, the company you work for, or bank information.
Cybercriminals will find out what they can about you on the internet and then
attempt to add you as a friend on social accounts. Once they gain access to an
account, they can sell your information or secure accounts in your name.
PUPs
Phishing
This type of attack involves hackers sending malicious email attachments or URLs
to users to gain access to their accounts or computer. Cybercriminals are
becoming more established and many of these emails are not flagged as spam.
Users are tricked into emails claiming they need to change their password or
update their billing information, giving criminals access.
Prohibited/Illegal Content
Online Scams
These are usually in the form of ads or spam emails that include promises of
rewards or offers of unrealistic amounts of money. Online scams include enticing
offers that are “too good to be true” and when clicked on can cause malware to
interfere and compromise information.