0% found this document useful (0 votes)
8 views3 pages

CYBERCRIME

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts.

Uploaded by

Lhea A. Ayfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

CYBERCRIME

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts.

Uploaded by

Lhea A. Ayfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBERCRIME

 Or computer crime is any criminal offense that involves a computer and network.
 It can take various forms including the creation of malicious programs, denial of service attacks,
rouge, wi-fi hotspots, data manipulation, identity theft, internet scams and cyberbullying

ASPECTS THAT COMPUTER CRIMINALS CAN BE DANGEROUS:


a. Human threat
b. Organizational threat
c. Group threat
d. National security threat

WHY COMPUTER INCIDENTS ARE PREVALENT


INCREASING COMPLEXITY INCREASES VULNERABILITY
 Increasing the level of complexity Vulnerability is heightened. As more devices are connected to
a network, the number of potential entry points grows, raising the risk of security breaches

HIGHER COMPUTER USER EXPECTATION


 Money equals time the most involved active Computer users can be, the sooner they can sove a
problem. As a result, tech service desks are under tremendous pressure to respond to customer
inquiries as quickly as possible

TCHNOLOGICAL ADVANCEMENT INTRODUCE NEW RISKS


 Knowledge is exchange on networks with millions of other machines due to increased market
demands

INCREASE RELIANCE ON COMMERCIAL SOFTWARE WITH KNOWN VULNERABILITIES


 Many companies are heavily reliant on proprietary software that has known flaws

BRINGING YOUR OWN DEVICE (BYOD) POLICY


 Employees access company data using persona; devices such as cellphones, smartphones, and
notebook computers to stay connected and available at all times, posting a security risk

DELAY IN SOFTWARE UPDATES


 Unaware of the looming dangers and defer program upgrades for a variety of reasons, including
a lack of time, additional costs

CLASSIFICATION OF PERPETRATORS OF COMPUTER CRIME


1. HACKERS
- Do it out of scientific curiosity and see how they can get to information systems and how far
they can go

2. CRACKERS
- Hack into other peoples networks and systems to do things like deface websites, crash
computers, distributed malicious programs or hateful messages

3. MALICIOUS INISDERS
- Often granted access to the networks they misuse, they are difficult to track or avoid
4. INDUSTRIAL SPIES
- They procure trade secrets from their sponsor’s rivals by fraudulent means. Insiders such as
angry employers and ex-employees, are the most common thieves of trade secrets.

5. CYBER CRIMINALS
- Opportunity for materials to gain motivates cybercriminals. They rob by breaking into
company servers and converting funds from account to another, leaving a hopelessly
confusing path for law enforcement to trace.

6. CYBERTERRORISTS
- Advance such as political or social objectives, a cyber terrorist conducts a computer based
assault against other computers or networks in an effort to intimate or coerce a nation

CLASSIFICATION OF HACKERS
1. WHITE HATS HACKERS
- Ethical hackers

2. BLACK HAT HACKERS


- Also known as CRACKERS
- Attempt to obtain unauthorized access to a device in order to disrupt its activities or steal
classified information

3. GRAY HAT HACKERS


- Mix black and white
- They behave w/o malice just for the sake of amusement, they exploit security flaw in a
computer device or network w/o the consent

4. MISCELLANEOUS HACKER
- Types of hackers depending on what they hack and how they hack. The following are some
of them
a. RED HAT HACKER – combination of black and white hat hackers. They operate the level
of hacking government departments, top secret intelligence hubs
b. BLUE HAT HACKER – person who works independently of computer security consultancy
companies and is responsible for bug-testing
c. ELITE HACKER – hackers social standing that is used to identify the most experienced
hacker
d. SCRIPT KIDDIE – non-expert who breaks into computer systems using pre-packaged
programmed tools written by others and no knowledge of the underlying definition
e. GREEN HAT HACKER – newbie, someone who is new to hacking or phreaking and has
little to no understanding
f. HACKTIVIST – hackers who uses computers to spread a message that is psychological,
ideological, moral or governmental.

TYPES OF COMPUTER ATTACKS


1. VIRUSES
- Travels through networks and operating systems and attaching themselves to a variety of
other programs and databases.
- Modify and erase files
2. WORMS
- Repeatedly reproduce themselves. The self-replicating activity clogs computer and networks
until it becomes involved in a network

3. TROJAN HORSES
- Contains malicious code. Seen in free video games and screensaver applications that can be
downloaded from the internet
4. m

You might also like