Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer crimes.
INTRODUCTION & QUESTIONS.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Botnets A collection of compromised machines
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 19.1 Cyberlaw and Cybercrime
Physical Safety Issues
A Project on CYBER SECURITY
National Cyber Security Month
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
COMPUTER CRIME.
Botnets A collection of compromised machines
Lesson 2- Protecting Yourself Online
Information Security Session October 24, 2005
Internet Safety Vocabulary
Philip Nichilo Vincent Carestia
Computer Security.
LEGAL TERMS IN DIGITAL MEDIA
The Crime and Deviance Channel
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Entering the World of Cybercrime
Lesson 2- Protecting Yourself Online
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as cyber stalking) or as the target of a crime (such as identity or intellectual property theft). Cybercrimes fall into two broad categories: Those affecting people. Those affecting businesses. The types and objectives of cybercrimes generally reflect those of non-cybercrime (theft, fraud and so on) and the global cost of cybercrime is an estimated $600 billion per year. Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Identifying a selected range of cybercrimes in terms of their type, criminal obejctives and estimated global costs… Hacking Viruses DDoS Attacks Phishing Spamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Any form of unauthorised access to a computer or computer network. Criminal objectives vary, but may include data theft, changing or destroying data and using a hacked computer in a DDoS attack. Estimating the global cost of hacking is difficult because it covers a wide variety of criminal activities, not all of which involve economic loss. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Malicious code used to infect a computer or network, that modifies / deletes files, steals data and passwords or, as with Ransomware, locks the user out until a ransom is paid. Criminal objectives vary, from theft of data / passwords and demands for money to gaining remote control of a computer for use in DDoS attacks. Estimated costs virus / malware infections: $50+ billion worldwide. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime A Distributed Denial of Service (DDoS) attack is an attempt to crash a computer system, network or web site by flooding it with more requests for access than it can handle, causing it to shutdown. DDoS attacks are usually co-ordinated by botnets – networks of computers infected with malware are controlled by the attacker without their owners knowledge. DDoS attacks are used for political or economic purposes (estimated cost to US business was around $10 billion in 2019) Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime The attempt to deceive someone into revealing sensitive information, such as credit card details or bank passwords, by disguising the fraudulent request in a seemingly trustworthy electronic communication. The criminal objective is usually economic and the estimated cost to US businesses runs at $500+ million each year. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime An unsolicited message sent indiscriminately to a large number (frequently millions) of receivers. Over half (56%) of all email traffic in 2019 was spam and it is illegal in the EU and UK. Spam may have criminal objectives, such as fraud (“advance fee” frauds ask the victim to send a “fee” to the scammer release funds “owing to the victim”) or blackmail (threatening to reveal sensitive information about the victim) or it may be used to advertise anything from porn to counterfeit goods. The costs of spam – such as the time and money spent blocking or removing it – are hard to quantify, but spam scams in the US are estimated to cost businesses $5 - $10 billion a year. Hacking Viruses DDoS Attacks Phishing Spamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime The theft of a web site, computer processing or reputation: Webjacking: the fraudulent takeover of a site or the creation of cloned version of an existing site. Cryptojacking: using a victim’s computer to mine cryptocurrency. Repjacking: the fraudulent use of a (celebrity’s) reputation to enhance the status of whatever is being sold. Criminal objectives include demanding a ransom for return of control, identity and password theft, redirecting users to malicious web sites, fraudulent endorsements. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Obsessive following, using electronic media (email, social networks, forums…), for the purpose of harassment, intimidation, surveillance, identity theft and so forth. The criminal objectives of cyberstalking may be personal (to cause a victim known to the stalker fear, stress, mental anguish and the like) or institutional: to stir-up communal fear or hatred of an individual or group. Cyberstalking rarely has economic objectives, but can have direct or indirect personal or political consequences. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Fraudulently obtaining and using someone’s identity or personal data. The criminal objectives in identity theft involve using theft and deception to commit things like credit card fraud (using someone else’s identity to buy goods and services) and bank fraud (gaining access to someone’s bank account). The global economic costs of identity theft are anywhere between $5 - $10 billion. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Stealing very small amounts of money from a large number of people over a long period of time. A programmer, for example, may illegally insert code into an accounting program that diverts tiny amounts of money, taken from millions of people, into a separate bank account. The criminal objective is normally theft, although information slicing – building-up a complex picture of an individual or organisation through many time bits of information – may have other objectives. Estimating the global cost of slicing is difficult because victims may be unaware of their victimisation. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Intellectual Property theft (“piracy”) involves stealing ideas, inventions and properties (such as films, music and software). Criminal objectives are largely directly economic, such as reselling stolen digital properties or using these properties to sell advertising to users who freely download them, or indirectly economic (stealing and producing someone else’s invention). Estimates of the global cost of IP theft vary between $50 - $75 billion per year. Hacking Viruses DDoS Attacks Phishing Scamming Jacking Cyber Stalking Identity Theft Slicing IP Theft End Presentation Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg

Types of Cybercrime Shortcutstv Types of Cybercrime shortcutstv.com Photo by WanderingtheWorld (www.ChrisFord.com) - Creative Commons Attribution-NonCommercial License https://live.staticflickr.com/1283/4663275780_dabe062123_b.jpg Shortcutstv shortcutstv.com