Intro To Cybercrime
Intro To Cybercrime
Ransomware - is a type of malware that encrypts a user’s files or locks them out of their system , demanding a ransom in exchange for
restoring access. Malware used by offenders to lock digital files of another person or company until money or other form of ransom is
paid to the offender.
Phishing- A way for criminals to obtain private information from a victim bysending an e-mail that appears to be from a legitimate
organization. The e-mail often uses letterhead from the agency or a logo from the company to make it look real. The message indicates
that an account or password needs to be updated. The victim is tricked into providing that information to the offender, who then uses
it to steal the victim’s money or sells the information to another offender
Identity Theft – involves the unauthorized use of someone’s personal information , To commit fraud or other malicious intent. A
criminal obtains a victim’s personal information (possibly through phishing) and uses that to commit theft or fraud offenses, open fake
credit card accounts, or get bank loans. They use a victim’s name, birthday, social security number, driver’s license number, or passport
information. A victim of identity theft can suffer extreme and long-lasting financial harm. This offense is not punishable under the
federal Identity Theft and Assumption Deterrence Act of 1998, which “makes it a federal offense to possess, transfer or use a means of
identification of another person without authorization with the intent to commit or aid in the commission of illegal activity at the local,
state or federal level.”
Child Pornography- This offense has been defined as “the sexual or sexualized physical abuse of children under 16 years of age or who
appear to be less than 16 .
Children who are forced into participating in the acts suffer trauma and are often permanently injured, both physically and
emotionally.
The internet allows people to access child pornography for free, but there are multiple sites on the dark web that make these images
readily available. It is estimated that there are 20,000 images of child pornography added to the internet each week (Pittaro, 2008).
Because of the sheer amount of child pornography available on the internet, law enforcement has a difficult time tracking users. It is
easy for offenders to skirt the law and get away with this offense.
Cyberstalking – Involves the persistent unwanted online pursuit of an individual , after through social media or other digital platforms.
It is also includes harassment, threats , or monitoring someone’s online activities without their consent. Use of internet to stalk or
harass or intimidate an individual or group.
Example: Creating fake social media account to keep in touch with an ex partner, Liking of your old photos
Cyberbullying – Bullying with the use of digital technologies. Deliberate and repeated aggressive behavior
online, targeting an individual or group.
Ex. spreading lies about or posting embarrassing photos or videos of someone on social media.
Cyber Espionage – Type of cyber attack that malicious hackers carry out against a business or government
entity . Involves collection of sensitive data from business or governments.
Some key aspect of Cyber Espionage:
• State Sponsored Espionage – Governments may conduct cyber espionage to gather intelligence on other
nations , including political , military or economic information.
• Corporate Espionage – Business or individuals may use cyber espionage to steal trade secrets , or
competitive information from rival companies.
IOT Hacking – Targets devices connected to the internet such as smart home appliances , cctv (closed-circuit
television) and medical devices.
Online Piracy – is the practice of downloading and distributing copyrighted works digitally without
permission such as music or software.
DOS (Denial of Service)- is a malicious attempt to disrupt the normal traffic of a targeted server, service or
network by overwhelming the target or its surrounding infrastructure with a flood of traffic making it in
accessible users . their motivation is disrupt the normal functioning of the targeted service.
Spoofing - is the act of disguising a communication from an unknown source as being from a known, trusted
source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a
computer spoofing an IP address.
Cybercrimes that falls under online harassment:
(This may involves threats, embarrassment or humiliation in an online
setting.)
1. Cyberstalking – Use of internet to stalk or harass or intimidate an
2. Cyberbullying –
3. Doxing – Sharing someone’s private information online without
their permission(dropping of documents)
4. Revenge Porn – Sharing intimate images or videos of a person
without their permission, often as a form of retaliation (revenge).
5. Hate Speech – To spread discriminatory of offensive language
targeting specific groups.
6. Harassment through Impersonation – Creating fake profiles or using
someone else’s identity online to deceive, intimidate or harm them.
Most Common Cyber Crimes
1. Phishing- is a type of cyber attack where attackers use deceptive emails , images , or
website to trick individuals into revealing sensitive information such as usernames,
passwords , or financial details.
2. Identity Theft – is a form of fraud in which an unauthorized individual obtains and uses
someone else’s personal information , such as name, social security number, or
financial details without their permission.
3. Hacking – Misuse of devices and networks to cause damage , gather information or
disrupt activity.
- Gaining of unauthorized access to data in a system or computer .
Example: brute force attack , keystroke logging(Type of malware designed to track every
key stroke and report it back to a hacker , typically a user will download malware)
4. Cyberbullying – Bullying with the use of digital technologies. Deliberate and repeated
aggressive behavior online, targeting an individual or group.
5. Malware Attacks – are any type of malicious software designed to cause harm or
damage to a computer , server, client or computer network.
Some examples of malware:
Viruses-One of the most common example of malware (corrupt files)
Protective Measures against Virus:
• Install reliable anti-virus program
• Being cautious when downloading and opening files
• Regularly update software to patch any vulnerabilities
Worm-Can spread without user action ,They exploit vulnerabilities in operating systems automatically spreading
from computer to computer.
Protective Measures against Worms:
• Its essential to keep system and software up to date.
• Regular patching of vulnerabilities and the use of a good firewall(network security system that filters and monitor
incoming and outgoing network traffic based a security rules to determined what to allow on your network what to
block).
Trojan – Named after the legendary Trojan Horse , It is a type of malware that disguises itself s a normal file or
program .Users are tricked into loading and executing trojans into their systems . Once activated Trojans can enable
cybercriminals to spy on users , steal sensitive data or gain backdoor access in a system.
Protective Measures against Trojans:
• Avoid downloading software or files from unknown sources and be wary of email attachment from unfamiliar
senders.
• Regular update of software and use reliable anti-virus tool on all end points.
• CYBERSEX TRAFFICKING-involves the use of internet to exploit individuals,often
minors,in live-streamed or recorded sexual acts in exchange for money , goods, or
other services. (aiming personal benefits /gain)
• CHILD PORNOGHAPY- are minors below 16, featuring featuring minors engaged in
sexual activities ,typically in the form of photos or videos, but it may not
necessarily involve live exploitation.
• CYBERSQUATTING- refers to unauthorized registration and the use of internet
domain names that are identical or similar to trademarks , service marks, or
personal names.(e.g.com, .gov .ph).
• DRUG TRAFFICKING- Darknet markets are use to buy and sell recreational drugs
online.Some drug traffickers used encrypted messaging tools to communicate with
drug mules.(mules is a person who transport illegal drug)
• CYBER TERRORISM- refers to the use of cyberspace to conduct terrorist activities.
(their aim is to advance their political and ideological means). Is usually defined as
any premeditated, politically motivated attack against information systems,
programs, and data that threatens violence or results in violence.
• CYBER SECURITY- It is a practice of protecting system, network and program
from digital attacks.