0% found this document useful (0 votes)
29 views17 pages

Intro To Cybercrime

Uploaded by

gayldon123x
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views17 pages

Intro To Cybercrime

Uploaded by

gayldon123x
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

TYPES OF CYBERCRIMES

Ransomware - is a type of malware that encrypts a user’s files or locks them out of their system , demanding a ransom in exchange for
restoring access. Malware used by offenders to lock digital files of another person or company until money or other form of ransom is
paid to the offender.
Phishing- A way for criminals to obtain private information from a victim bysending an e-mail that appears to be from a legitimate
organization. The e-mail often uses letterhead from the agency or a logo from the company to make it look real. The message indicates
that an account or password needs to be updated. The victim is tricked into providing that information to the offender, who then uses
it to steal the victim’s money or sells the information to another offender
Identity Theft – involves the unauthorized use of someone’s personal information , To commit fraud or other malicious intent. A
criminal obtains a victim’s personal information (possibly through phishing) and uses that to commit theft or fraud offenses, open fake
credit card accounts, or get bank loans. They use a victim’s name, birthday, social security number, driver’s license number, or passport
information. A victim of identity theft can suffer extreme and long-lasting financial harm. This offense is not punishable under the
federal Identity Theft and Assumption Deterrence Act of 1998, which “makes it a federal offense to possess, transfer or use a means of
identification of another person without authorization with the intent to commit or aid in the commission of illegal activity at the local,
state or federal level.”
Child Pornography- This offense has been defined as “the sexual or sexualized physical abuse of children under 16 years of age or who
appear to be less than 16 .
Children who are forced into participating in the acts suffer trauma and are often permanently injured, both physically and
emotionally.
The internet allows people to access child pornography for free, but there are multiple sites on the dark web that make these images
readily available. It is estimated that there are 20,000 images of child pornography added to the internet each week (Pittaro, 2008).
Because of the sheer amount of child pornography available on the internet, law enforcement has a difficult time tracking users. It is
easy for offenders to skirt the law and get away with this offense.
Cyberstalking – Involves the persistent unwanted online pursuit of an individual , after through social media or other digital platforms.
It is also includes harassment, threats , or monitoring someone’s online activities without their consent. Use of internet to stalk or
harass or intimidate an individual or group.
Example: Creating fake social media account to keep in touch with an ex partner, Liking of your old photos
Cyberbullying – Bullying with the use of digital technologies. Deliberate and repeated aggressive behavior
online, targeting an individual or group.
Ex. spreading lies about or posting embarrassing photos or videos of someone on social media.
Cyber Espionage – Type of cyber attack that malicious hackers carry out against a business or government
entity . Involves collection of sensitive data from business or governments.
Some key aspect of Cyber Espionage:
• State Sponsored Espionage – Governments may conduct cyber espionage to gather intelligence on other
nations , including political , military or economic information.
• Corporate Espionage – Business or individuals may use cyber espionage to steal trade secrets , or
competitive information from rival companies.
IOT Hacking – Targets devices connected to the internet such as smart home appliances , cctv (closed-circuit
television) and medical devices.
Online Piracy – is the practice of downloading and distributing copyrighted works digitally without
permission such as music or software.
DOS (Denial of Service)- is a malicious attempt to disrupt the normal traffic of a targeted server, service or
network by overwhelming the target or its surrounding infrastructure with a flood of traffic making it in
accessible users . their motivation is disrupt the normal functioning of the targeted service.
Spoofing - is the act of disguising a communication from an unknown source as being from a known, trusted
source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a
computer spoofing an IP address.
Cybercrimes that falls under online harassment:
(This may involves threats, embarrassment or humiliation in an online
setting.)
1. Cyberstalking – Use of internet to stalk or harass or intimidate an
2. Cyberbullying –
3. Doxing – Sharing someone’s private information online without
their permission(dropping of documents)
4. Revenge Porn – Sharing intimate images or videos of a person
without their permission, often as a form of retaliation (revenge).
5. Hate Speech – To spread discriminatory of offensive language
targeting specific groups.
6. Harassment through Impersonation – Creating fake profiles or using
someone else’s identity online to deceive, intimidate or harm them.
Most Common Cyber Crimes
1. Phishing- is a type of cyber attack where attackers use deceptive emails , images , or
website to trick individuals into revealing sensitive information such as usernames,
passwords , or financial details.
2. Identity Theft – is a form of fraud in which an unauthorized individual obtains and uses
someone else’s personal information , such as name, social security number, or
financial details without their permission.
3. Hacking – Misuse of devices and networks to cause damage , gather information or
disrupt activity.
- Gaining of unauthorized access to data in a system or computer .
Example: brute force attack , keystroke logging(Type of malware designed to track every
key stroke and report it back to a hacker , typically a user will download malware)
4. Cyberbullying – Bullying with the use of digital technologies. Deliberate and repeated
aggressive behavior online, targeting an individual or group.
5. Malware Attacks – are any type of malicious software designed to cause harm or
damage to a computer , server, client or computer network.
Some examples of malware:
Viruses-One of the most common example of malware (corrupt files)
Protective Measures against Virus:
• Install reliable anti-virus program
• Being cautious when downloading and opening files
• Regularly update software to patch any vulnerabilities
Worm-Can spread without user action ,They exploit vulnerabilities in operating systems automatically spreading
from computer to computer.
Protective Measures against Worms:
• Its essential to keep system and software up to date.
• Regular patching of vulnerabilities and the use of a good firewall(network security system that filters and monitor
incoming and outgoing network traffic based a security rules to determined what to allow on your network what to
block).
Trojan – Named after the legendary Trojan Horse , It is a type of malware that disguises itself s a normal file or
program .Users are tricked into loading and executing trojans into their systems . Once activated Trojans can enable
cybercriminals to spy on users , steal sensitive data or gain backdoor access in a system.
Protective Measures against Trojans:
• Avoid downloading software or files from unknown sources and be wary of email attachment from unfamiliar
senders.
• Regular update of software and use reliable anti-virus tool on all end points.
• CYBERSEX TRAFFICKING-involves the use of internet to exploit individuals,often
minors,in live-streamed or recorded sexual acts in exchange for money , goods, or
other services. (aiming personal benefits /gain)
• CHILD PORNOGHAPY- are minors below 16, featuring featuring minors engaged in
sexual activities ,typically in the form of photos or videos, but it may not
necessarily involve live exploitation.
• CYBERSQUATTING- refers to unauthorized registration and the use of internet
domain names that are identical or similar to trademarks , service marks, or
personal names.(e.g.com, .gov .ph).
• DRUG TRAFFICKING- Darknet markets are use to buy and sell recreational drugs
online.Some drug traffickers used encrypted messaging tools to communicate with
drug mules.(mules is a person who transport illegal drug)
• CYBER TERRORISM- refers to the use of cyberspace to conduct terrorist activities.
(their aim is to advance their political and ideological means). Is usually defined as
any premeditated, politically motivated attack against information systems,
programs, and data that threatens violence or results in violence.
• CYBER SECURITY- It is a practice of protecting system, network and program
from digital attacks.

• AWARENESS - As technology advances, and more people rely on the internet


to store sensitive information such as credit card ,passwords, information,
cyber criminals also increasingly attempt to steal that information.Cybercrime
is becoming more of a threat to people across the world.According to the
FBI’s Internet Crime Complaint Center in 2014 , there are 1.5 million cyber-
attacks annually,that means 4,000 attack a day, 170 attacks every hour, or
nearly 3 attacks every minute.And anybody who uses the internet for any
reason can be a victim.which is why it is important to be aware everytime
whwn using computer and internet .
TYPES OF STALKERS:
1. Rejected Stalker- This type of stalker becomes upset when the friendship or romantic
relationship has ended.the jejected stalker is not only self-centered and jealous but also
over-dependent and persistent.
2. Resentful Stalker- The resentful stalker feels humiliated that the relationship has ended and
seeks revenge upon the victim.resenful stalkers are often irrationally paranoid and are
known to verbally assault thier victims.
3. Predatory Stalker- The predatory stalker seeks power and sexual gratification ,They will not
make physical contact but will use surveillance to track the victim.
4. Intimacy Seeker- The intimacy-seeking stalker seeks an intimate and romantic relationship
with the victim.When the stalker is rejected by the victim , he or she will continuallly phone
the victim, write the victim letters, and can become jealous and violent if the victim enters
into a relationship with someone else.
5. Incompetent Suitor- The incompetent suitor stalker usually has inadequate social skills.They
want a relationship with the victim but do not have the ability to realize he or she is not
meant to be with the victim.
6. Erotomania and Morbidly Infatuated- This type of stalker feelss that the victim loves them
even though they may not have had any contact with the victim.The stalker is usually
Who is the Hacker?
A hacker is an individual who uses computer, network or other skills to overcome a technical
problem.
The term hacker may refer to anyone with technical skills, but it often refers to a person who
uses his or her abilities to gain unauthorized access to systems or networks in order to commit
crimes.
Types of hackers:
• White hat hackers-( a.k.a ethical hackers) - is an individual who uses hacking skills to identify
security vulnerabilities in hardware, software or networks.
-work with (individuals, bussinesses, organization, etc) to help identify weakness in thier
systems and make corresponding updates.They do this to ensure that black hat hackers cannot
access the system’s data illegally.
• Black hat hackers- are criminals who break into computer networks with malicious intent.
They may also release malware that destroys files, holds computers hostage, or steals
passwords, credit card numbers, and other personal information.
• Gray hackers-enact a blend of both black hat and white hat activities. Gray hat hackers often
look for vulnerabilities in a system without the owner's permission or knowledge. If issues are
found, they report them to the owner, sometimes requesting a small fee to fix the problem.
SOME HACKING TECHNIQUES:
Bait and Switch- An attacker can buy advertising spaces on the websites.Later
when a user clicks on the ads he might get directed to a page that is infected with
malware.This way,they can further install malware or adware on your computer.
Clickjacking attacks-is an attack that tricks a user into clicking a webpage element
which is invisible or disguised as another element. This can cause users to
unwittingly download malware, visit malicious web pages, provide credentials or
sensitive information, transfer money, or purchase products online.
“users believe they are interacting with a legitimate source, but there’s an invisible
layer (or multiple layers) added by the hacker.This hidden layer contains malicious
elements or actions.When the user interacts with what seems to be the legitimate
content,they are inadvertenly (accidentally)interacting with the hidden malicious
layer as well.It’s a deceptive technique that exploits the visual presentation of the
webpage to trick users into engaging with the hidden , harmful elements.”
• Eavesdropping- An eavesdropping attack occurs when a hacker intercepts,
deletes, or modifies data that is transmitted between two devices.
Eavesdropping, also known as sniffing or snooping, relies on unsecured
network communications to access data in transit between devices.(MITM)
• Virus,Trojan etc. virus or Trojans are malicious software programs which get
installed into the victim’s system and keeps sending the victims data to the
hacker. They can also lock your files ,serve fraud advertisement,
• Phishing- is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message.
• Fake WAP-(Wireless Access Point) is a type of hacking attack in which the
hacker sets up a wireless router with a convincingly legitimate name in a public
spot where people might connect to it. Once they do, the hacker can monitor
and even change internet connections to steal sensitive data or force the user
to download malware onto their device.
Waterhole Attacks- To poison a place , in this case the hackers hits the most accessible
physical point of the victim.
Religious communities, political party websites, and the media have all been victims of
recent waterhole attacks.
For example:
If the source of the river is poisoned,it will hit the entire stretch of animals during
summer.In the same way , hackers target the most accessed pyhsical location to attack
the victim.That point could be coffee shop,a cafeteria, etc.
Denial of Service (DoS/DDoS)- A denial of service attack is hacking technique to take
down a site or server by flooding that site or server with a lot of traffic that the server is
unable to process all the request in the real time and finally crashes down. This popular
technique, the attacker floods the targeted machine with tons of requests to overwhelm
the resources, which, in turn,restrict the actual request from being unfulfilled.
For DDoS attacks, hackers often deploy botnets or zombie computers which have got the
only work to flood your system request packets,With each passing year , as the malware
and types of hackers keep getting advance, the size of DDoS attacks keep getting
increasing.
Keylogger-is a simple software that records the key sequence and strokes of
your keyboard into a log file on your machine.These log files might even contain
your personal email ID’s and passwords. Also known as keyboard capturing , It
can be eithier software or hardware .While software- based keyloggers target
the programs installed on a computer,hardware devices target keyboards ,
electromagnetic emmissions, smartphone sensors etc.Keyloggeris ssone of the
main reasons why online banking sites give you an option to use their virtual
keyboards, So, whenever you’re operating a computer in public setting, try to
take extra caution.
Ways to protect yourself from hackers:
1. Use unique, complex passwords
A strong password is not easy to guess and ideally made up of a
combination of upper- and lower-case letters, special characters,
and numbers. People often leave passwords unchanged for years,
which reduces their security. By breaching a password, hackers
get one step closer to getting your data. Avoid writing your
passwords down on a piece of paper, and don't share them with
others. A password manager tool is an excellent way to manage
your passwords.

2. Never click on links sent in unsolicited emails


They may be part of a phishing scam, an attempt to gain your
passwords, credit card numbers, banks account details, and more.
3. Use secure websites
Use shopping websites that have Secure Sockets Layer (SSL) encryption. To check
whether a website has this installed, look at the URL – it should begin with
"HTTPS://" instead of "HTTP://". The "s" stands for "secure". There will also be a
lock icon nearby, and where this appears depends on your browser. Try to avoid
saving payment information on shopping websites – if fraudsters compromise the
site, they will gain access to your information.

4. Enable two-factor authentication


This adds a layer of security to the login process. When you set it up, you will still
need to enter your username and password, but you will also have to verify your
identity through a second authentication factor – often a PIN sent to your cell
phone. This means an identity thief would need to know your login details and
have possession of your cell phone – which is a less likely scenario.
5. Be careful when using public Wi-Fi networks
They can be unencrypted and unsecured, leaving you vulnerable to hackers looking to
steal any information which passes between you and the websites you visit. Your
personal information, such as passwords or financial data, is then vulnerable to identity
theft. Using a VPN can help.

6. Deactivate the autofill option


It is a time-saving feature, but if it is convenient for you, it's also convenient for hackers.
All the auto-fill info must be kept somewhere, such as in your browser profile folder.
This is the first place a hacker will go to look for your name, address, phone number,
and all the other information they need to steal your identity or access your accounts.

7. Choose apps wisely


Only download apps from trustworthy sources such as the Apple App Store or Google
Play. Make sure you update your software and apps regularly and get rid of old apps
you don’t use.
8. Trace or erase
Make sure your data is secure if your mobile device is stolen or lost. You can install software
that can wipe your phone if it is lost. You can also set up your device to lock itself after a pre-
set number of failed login attempts.

9. Install trusted cybersecurity across all your devices


Cybersecurity like, Kaspersky Internet Security blocks viruses and malware in real-time and
stops hackers from taking over your PC remotely. So you and your family will always be
protected — no matter what device you’re using to access the internet.

You might also like