Cybercrime Essentials
Cybercrime Essentials
Essentials
Learning Outcomes:
text message from a cybercriminal can convince people to transfer money, provide
Tactics to defraud:
Phishing: tactics include deceptive emails, websites, and text messages to steal
information.
●
Spear phishing: email is used to carry out targeted attacks against individuals or
businesses.
●
Baiting: an online and physical social engineering attack that promises the victim a
reward.
●
Malware: victims are tricked into believing that malware is installed on their computer
and that if they pay, the malware will be removed.
●
Pretexting: uses false identity to trick victims into giving up information.
●
Vishing: urgent voice mails convince victims they need to act quickly to protect
themselves from arrest or other risk.
For example, by looking at each other’s social media accounts to identify information that
could potentially be used to defraud their peers.
Routine importance of cybersecurity testing.
●
Current UK legislation that applies to different IT systems and data.
●
The principles and requirements of the data protection legislation (The
Data Protection Act, 2018, GDPR) and its impact on organisations, IT
systems and data.
●
Computer Misuse Act 1990, its definitions of illegal practices and the
impact it has on organisations, IT systems and data.
●
Other legislation could include: Official Secrets Act 1989, The Privacy
and Electronic Communications Regulations 2003.