Cybercrime

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

CYBERCRIME

GROUP 2
Development of Computer
Crime and Cybercrime
The first cybercrime attack happened in France well
before the internet was even invented, in 1834. Attackers
stole financial market information by accessing the
French telegraph system. From that moment on,
cybercrime has grown exponentially, marked by an
intriguing evolution of tactics, techniques, and
procedures — all implemented for malicious gain.
The 1990s: New Technology Brings New Crime Escalating rates
of cybercrime signaled that attackers now enjoyed fresh
opportunities and were devising new means to gain
unauthorized access to systems and manipulate data across
the web. Here’s some of the notable cybercrimes of this
decade.

The 2000s: Cybercrime Ramps up


The first decade of the new millennium saw more sophisticated
attacks and an abundance of advanced persistent threat actors
(APTs), most of which were sponsored by nation-states. The
evolution of cybercrime meant new viruses and worms, which
caused significant damage to critical sectors of the global,
digital economy
The 2010s: Explosion of Computer and Cybercrimes Cybercrime
wasn’t the only industry that saw huge growth. Organizations began
employing more cybersecurity professionals to counter the risk of
cyber threats as the sense of assumed digital security dissipated.
And, due to the demand for constant data security, a new field
emerged known as ethical hacking, whose sole purpose is to discover
vulnerabilities prior to malicious exploitation.
The 2020s – Present: Billions of Dollars Lost Gaining access to
personal data such as usernames and passwords, customer names,
contact information, credit card numbers, as well as expiration dates
and virtual card numbers.
WHAT IS
CYBERCRIME?
It is an activity done using computers and internet. Any crime that
takes place online such as identity theft, revenge porn, cyber-
stalking, harassment, and child exploitation.
HOW TO PROTECT AGAINST
CYBER CRIME?
To protect against 7. **Install a Firewall
cybercrime, consider these 8. *Educate and Train Employees:
measures: 9. *Monitor Financial Transactions:*
1. *Use StrongPasswords: 10. *Implement Security Policies:*
2. *Update Software 11. *Keep Personal Information
Regularly:* Private:* 1
3. **Enable Two-Factor 2. *Regular Security Audits:*
Authentication (2FA)
4. **Be Wary of Phishing Remember, a combination of
Attempts proactive measures, user education,
5. **Secure Wi-Fi Networks and ongoing vigilance is essential
6. **Backup Data Regularly for effective cybersecurity.
HISTORY OF CYBERCRIME?
The first recorded cybercrime took place in 1820. That is not
surprising considering the fact that the abacus, which is thought to
be the earliest from of a computer, has been around since 3500 B.C.
In India, Japan and China, the era of modern computer, however,
began with the analytical engine of Charles Babbage.
Cybercrime first started with hackers trying to break into computer
networks. Some did it just for the thrill of accessing high-level
security networks, but others sought to gain sensitive, classified
material. Eventually
HISTORY OF CYBERCRIME
Cybercrime first started with hackers trying to break into computer
networks. Some did it just for the thrill of accessing high-level
security networks, but others sought to gain sensitive, classified
material. Eventually, criminals started to infect computer systems
with computer viruses, which led to breakdowns on personal and
business computers.
Cybercrimes can be defined as: "Offenses that are committed against
individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or causes physical or
mental harm, or loss, to the victim directly or indirectly.
Cybersecurity
Cybersecurity is the collection of tools, policies, security concepts,
security safeguards, guidelines, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to
protect the cyber environment and organization and user’s assets.
Advantages
The cyber security will defend us from critical attacks.
1. It helps us to browse the site, website.
2. Internet Security process all the incoming and outgoing data on your
computer.
3. It will defend us from hacks and virus.
4. Application of cyber security used in our PC needs update every week

SAFETY T I P S TO CYBER C R I M E
1. Use antivirus Software
2. Insert Firewalls
3. Uninstall unnecessary software
4. Maintain backup
5. Check security settings
M a i n S t r a t e g i c Roles i n the G l o b a l
Cybersecurity Agenda
1)Legal measures;
2) Technical and procedural measures;
3) Organizational structures;
4) Capacity building; and
5) International cooperation.
Typology of Crime

Study of or analysis or classification based on types or categories. The


Convention on CyberCrime distinguishes between four (4) different types of
offenses
1. Offenses against the Confidentiality, Integrity, Availability of computer
data and systems ; •Illegal access, Illegal interception, data interference, system
interference and misused of device;
2. Computer-related offenses; •Computer-related Forgery and Computer-
related Fraud
3. Content-related offenses; •Offenses related to Child Pornography;
4. Copyright-related offenses; •Offenses related copyright infringements and
related
Cyber-extortion
It occurs when a website, e-mail server, or computer system is
subjected to or threatened with repeated denial of service or other attacks
by malicious
hackers.
Cyberterrorism
It refers to someone who intimidates or coerces a government or
an organization to advance his or her political or social objectives by
launching a computer-based attack against computers, networks, or the
information stored
on them.
Other Types of Cyber Crime
C l a s s i f i c a t i o n of Computer Crimes
1.Financial fraud crimes – Financial fraud can be broadly defined as an
intentional act
of deception involving financial transactions for purpose of personal gain.
2. Internet fraud – means trying to trick or scam someone else using the
Internet. Internet fraud can take place on computer programs such as chat
rooms, e-mail, message boards, or Web sites.
3. Computer fraud – is any dishonest misrepresentation of fact intended to let
another to do or refrain from doing something which causes loss. In this
context, the fraud willresult in obtaining a benefit by:
a. Altering in an unauthorized way
b. Altering, destroying, suppressing, or stealing output, usually to
conceal
unauthorized transactions.
c. Altering or deleting stored data
C l a s s i f i c a t i o n of Computer Crimes
. 4. Other forms of fraud may be facilitated using computer systems, including computer
systems such as;
a. Bank fraud- is the use of potentially illegal means to obtain money, assets, or
other property owned or held by a financial institution, or to obtain money from
depositors by fraudulently posing as a bank or other financial institution.
b. Carding – is a form of credit card fraud in which a stolen credit card is used to
charge pre-paid cards.
c. Identity theft – also known as identity fraud, is a crime in which an imposter
obtains key pieces of personally identifiable information, such as Social Security
or driver’s license numbers, in order to impersonate someone else.
d. Extortion– (also called shakedown, outwrestling and exaction) is a criminal
offense of obtaining money, property, or services from an individual or institution, through
coercion.
e. Theft of classified information- Classified information is sensitive information to which
access is restricted by law or regulation to particular classes of people.
Cyberwarfare
This is typically defined as a set of actions by a nation or organization to
attack countries or institutions' computer network systems with the
intention of disrupting, damaging, or destroying infrastructure by
computer viruses or denial-of-service attacks.
Computer as a target
These crimes are committed by a selected group of criminals. Unlike
crimes using the computer as a tool, these crimes require the technical
knowledge of the perpetrators. Such as Computer viruses, Denial-of-service
attacks, and Malware (malicious code).
Spamming
Spamming is the use of electronic messaging systems like e-mails and
other digital delivery systems and broadcast media to send
unwanted bulk messages indiscriminately.

Crimes that use computer networks


or devices;
Fraud and identity theft Fraud and identity theft
phishing phishing Information
Information warfare warfare Phishing scams
Phishing scams Spam
Spam
P hishing
It is the fraudulent attempt to obtain sensitive information such
as usernames, passwords and credit card details by disguising oneself as a
trustworthy entity in an electronic communication.

O n l i n e Harassment
Whereas content may be offensive in a non-specific way, harassment
directs obscenities and derogatory comments at specific individuals
focusing for example on gender, race, religion, nationality, sexual
orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested parties. Harassment on
the internet also includes revenge porn.
Drug t r a f f i c k i n g
Darknet markets are used to buy and sell recreational drugs online. Some
drug traffickers use encrypted messaging tools to communicate with drug
mules.

CATEGORIES OF CYBER CRIME


1. The computer as a target :-using a computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos attack etc.
2. The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
Investigation
A computer can be a source of evidence (see digital forensics). Even when a
computer is not directly used for criminal purposes, it may contain records
of value to criminal investigators in the form of a logfile. In most countries
are required, by law, to keep their logfiles for a predetermined amount of
time. For example; a European wide Data Retention Directive (applicable to
all EU member states) states that all E-mail traffic should be retained for a
minimum of 12 months.
Methodology of cybercrime
Investigation
Different types of high-tech crime may also include elements of low-tech
crime, and vice versa, making cybercrime investigators an
indispensable part of modern law-enforcement. Methodology of
cybercrime detective work is dynamic and is constantly improving,
whether in closed police units, or in international cooperation
framework.

Legislation
Different types of high-tech crime may also include elements of low-tech
crime, and vice versa, making cybercrime investigators an indispensable
part of modern law-enforcement. Methodology of cybercrime detective
work is dynamic and is constantly improving, whether in closed police
units, or in international cooperation framework.
Penalties
Penalties for computer related crimes in New York State can range from a
fine and a short period of jail time for a Class A misdemeanor such as
unauthorized use of a computer up to computer tampering in the first
degree which is a Class C felony and can carry 3 to 15 years in prison.
Stalking
It is when a perpetrator singles out a specific person and causes the
person emotional distress and causes the individual to fear for his or her
life, safety, or safety of others. A stalker can be a former
boyfriend or girlfriend, an acquaintance or a stranger.
Types of S t a l k i n g
1. Rejected Stalker- This type of stalker becomes upset when the
friendship or romantic relationship has ended. The rejected stalker is
not only self-centered and jealous but also over-dependent and
persistent.
2. Resentful Stalker – The resentful stalker feels humiliated that the
relationship has ended and seeks revenge upon the victim.
Resentful stalkers are often irrationally paranoid and are known to
verbally assault their victims.
3. Predatory Stalker- The predatory stalker seeks power and sexual
gratification. They will not make physical contact but will use
surveillance to track the victim.
Types of S t a l k i n g
4. Intimacy Seeker– The intimacy-seeking stalker seeks an intimate
and romantic relationship with the victim. When the stalker is rejected by
the victim, he or she will continually phone the victim, write the victim
letters, and can become jealous and violent if the victim enters into a
relationship with someone else.
5.Incompetent Suitor- The incompetent suitor stalker usually has
inadequate social skills. They want a relationship with the victim but do not
have the ability to realize he or she is not meant to be with the victim.
6. Erotomania and Morbidly Infatuated- This type of stalker feels that the
victim loves them even though they may not have had any contact with
the victim. The stalker is usually paranoid, prefers suitors in a higher social
class, and wil repeatedly approach the victim.
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk
or harass an individual, group, or organization. It may include false
accusations, defamation, slander and libel. It may also include monitoring,
identity theft, threats, vandalism, solicitation for sex, or gathering
information that may be used to threaten, embarrass or harass.
Cyberstalking is a criminal offense under various state anti-stalking, slander
and harassment laws. A conviction can result in a restraining order,
probation, or criminal penalties against the assailant, including jail.
O n l i n e Harassment or C y b e r
Harassment
Pertains to threatening or harassing emails, instant messages, or website
entries-To be considered cyberstalking, the behavior must pose a credible
threat of harm to the victim. All states have anti-stalking laws, but the legal
definitions vary.
T h a n k You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy