Computer & Internet Crime Notes PPIT
Computer & Internet Crime Notes PPIT
Computer and internet crimes involve illegal computer or network activities targeting
systems, data, or users. The internet's global nature and the increasing dependency on
technology have made cybersecurity critical to individuals, organizations, and governments.
Key Objectives
1. Understand the ethical and practical challenges in safeguarding data and systems.
2. Explore reasons behind the surge in computer-related security incidents.
3. Identify common types of attacks and exploits.
4. Analyze the motivations and tactics of cybercriminals.
1. Increasing Complexity:
○ Modern IT environments are interconnected and constantly evolving.
○ Cloud computing, remote work setups, and mobile devices expand
vulnerabilities.
○ Example: A cloud-based HR platform with weak access controls can be
exploited by attackers.
2. Expanding Systems:
○ Networks now connect millions of devices, creating more entry points for
attackers.
○ IT teams struggle to assess risks at the same pace as technological
advancements.
3. Over-Reliance on Commercial Software:
○ Organizations depend on widely used software, often with known
vulnerabilities.
○ Zero-Day Attacks:
■ Exploits targeting vulnerabilities before a patch is available.
■ Example: The WannaCry ransomware attack exploited an unpatched
Windows vulnerability.
4. Human Factors:
○ Users frequently reuse passwords, fall for phishing schemes, or fail to update
software.
○ Helpdesk errors, such as failing to verify caller identities, also contribute to
breaches.
Exploits are methods attackers use to gain unauthorized access or cause harm.
Understanding these helps in building defenses.
1. Viruses
● Definition: Malicious code attached to files that execute harmful actions when the
host file is opened.
● Spread:
○ Email attachments (e.g., “invoice.pdf” carrying a virus).
○ Downloads from malicious websites.
○ Infected USB drives.
● Impact:
○ Corrupts files.
○ Slows systems.
○ Example: The “ILOVEYOU” virus spread through email, deleting critical files.
2. Worms
3. Trojan Horses
5. Rootkits
6. Spam
7. Phishing
4. Types of Perpetrators
● Hackers:
○ Explore systems out of curiosity or to test limits.
○ Range from skilled professionals to amateurs using pre-made tools (script
kiddies).
● Crackers:
○ Engage in illegal activities like system breaches and data theft.
2. Malicious Insiders
● Definition: Employees or contractors who exploit authorized access for personal or
financial gain.
● Methods:
○ Selling sensitive information.
○ Sabotaging systems.
● Example:
○ An employee collaborates with an outsider to steal customer data for
monetary rewards.
3. Industrial Spies
4. Cybercriminals
● Engage in:
○ Identity theft.
○ Financial fraud (e.g., credit card scams).
○ Data breaches.
● Impact:
○ Loss of customer trust and revenue.
5. Hacktivists
6. Cyberterrorists
1. Computer Fraud and Abuse Act (CFAA): Criminalizes unauthorized access and
fraud.
2. Electronic Communications Privacy Act (ECPA): Protects electronic
communications from interception.
3. Economic Espionage Act (EEA): Penalizes theft of trade secrets.
1. Layered Security
2. Patch Management
3. User Education
4. Incident Response
5. Computer Forensics
● Preserving and analyzing digital evidence for legal investigations and prosecutions.