Surya

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

 What is Cyber Crime?

 Types of Cyber Crime


 The Cyber Attack
Process
 Preventing Cyber Crime
 Cyber Security Best
Practices
 Conclusion
What is Cyber
Crime?
Digital technologies are utilized to
commit cyber crimes, such as hacking
and online identity theft. Cyber crimes
tend to be remotely conducted globally,
making it more challenging for law
enforcement to capture the criminals,
compared to traditional crimes.
It is crucial to recognize the seriousness
of cybercrime in safeguarding
individuals and businesses from
financial loss, damage to reputation, and
exposure of confidential data.
Appropriate measures should be
implemented accordingly.
Types of Cyber Crime
DDoS Attacks

DDoS attacks are used to make an online service unavailable and take the
network down by overwhelming the site with traffic from a variety of sources.
Large networks of infected devices known as Botnets are created by depositing
malware on users’ computers. The hacker then hacks into the system once the
network is down.

Botnets

Botnets are networks from compromised computers that are controlled


externally by remote hackers. The remote hackers then send spam or attack
other computers through these botnets. Botnets can also be used to act as
malware and perform malicious tasks.
Identity Theft

This cybercrime occurs when a criminal gains access to a user’s personal


information to steal funds, access confidential information, or participate in tax
or health insurance fraud. They can also open a phone/internet account in your
name, use your name to plan a criminal activity and claim government benefits
in your name. They may do this by finding out user’s passwords through
hacking, retrieving personal information from social media, or sending phishing
emails.

Cyberstalking

This kind of cybercrime involves online harassment where the user is subjected


to a plethora of online messages and emails. Typically cyberstalkers use social
media, websites and search engines to intimidate a user and instill fear.
Usually, the cyberstalker knows their victim and makes the person feel afraid or
concerned for their safety.
Social Engineering

Social engineering involves criminals making direct contact with


you usually by phone or email. They want to gain your
confidence and usually pose as a customer service agent so
you’ll give the necessary information needed. This is
typically a password, the company you work for, or bank
information. Cybercriminals will find out what they can about you
on the internet and then attempt to add you as a friend on social
accounts. Once they gain access to an account, they can sell
your information or secure accounts in your name.

PUPs

PUPS or Potentially Unwanted Programs are less threatening than other


cybercrimes,
but are a type of malware. They uninstall necessary software in your
system including search engines and pre-downloaded apps. They can include
spyware or adware, so it’s a good idea to install an antivirus software to avoid the
malicious download.
PUPs

PUPS or Potentially Unwanted Programs are less threatening


than other cybercrimes, but are a type of malware. They uninstall
necessary software in your system including search engines and
pre-downloaded apps. They can include spyware or adware, so
it’s a good idea to install an antivirus software to avoid the
malicious download.

Phishing

This type of attack involves hackers sending malicious email


attachments or URLs to users to gain access to their accounts or
computer. Cybercriminals are becoming more established and
many of these emails are not flagged as spam. Users are tricked
into emails claiming they need to change their password or
update their billing information, giving criminals access.
Prohibited/Illegal Content

This cybercrime involves criminals sharing and distributing inappropriate content that can be
considered highly distressing and offensive. Offensive content can include, but is not limited to,
sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal
content includes materials advocating terrorism-related acts and child exploitation material. This
type of content exists both on the everyday internet and on the dark web, an anonymous
network.

Online Scams

These are usually in the form of ads or spam emails that include promises of rewards or offers of
unrealistic amounts of money. Online scams include enticing offers that are “too good to be true”
and when clicked on can cause malware to interfere and compromise information.

Exploit Kits

Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s
computer. They are readymade tools criminals can buy online and use against anyone with a
computer. The exploit kits are upgraded regularly similar to normal software and are available on
dark web hacking forums.

For example, a hacker might use a phishing email to trick an employee at a company into clicking on a link
that installs malware on their computer. Once the malware is installed, the hacker can use it to gain access
to the company's network and steal sensitive data. In another scenario, a criminal might use stolen
personal information to open a credit card account in someone else's name, racking up charges and
damaging the victim's credit score.
The Cyber Attack
Process
The cyber attack process involves several
steps, each of which is designed to gain access
to sensitive information or systems. The first
step is reconnaissance, where the attacker
gathers information about the target through
various means such as scanning for
vulnerabilities and identifying potential
weaknesses. Once the attacker has identified a
vulnerability, they move on to the exploitation
phase, where they attempt to gain access to
the system or network. This can be done
through various methods such as phishing
attacks, malware installation, or social
engineering tactics. Finally, the attacker moves
on to the exfiltration phase, where they steal or
extract the desired information from the
compromised system.Additionally,
attackers may use multiple techniques during
each phase to increase their chances of
success. As such, it's crucial to have strong
security measures in place to prevent and d
etect cyber attacks.
Preventing Cyber
Crime
To safeguard both yourself and your
organization against cyberattacks,
ensuring strong passwords is key. This
entails utilizing a mix of letters,
numbers, and symbols, while steering
clear of easily guessed words or
phrases.

Staying proactive is important in


preventing cyber attacks. One should
be updated and attentive to latest
threats, avoiding unverified links or
downloads, while staying vigilant
towards suspicious messages.
Additionally, keeping software and
security systems up to date is essential,
as updates contain important security
patches to prevent attacks.
Cyber Security Best Practices

Implementing strong passwords


is one of the most effective ways
to protect against cyber attacks.
Use a combination of
letters, numbers, and symbols
to create a password that is
difficult to guess.

Two-factor authentication adds


an extra layer of security by
requiring users to provide two
forms of identification, such as a
password and a fingerprint scan.
Conclusion
In conclusion, cyber crime is a
serious threat that affects
individuals and organizations alike.
We have covered the types of
cyber crime, the cyber attack
process, and strategies for
preventing cyber crime.

It is important to take cyber crime


seriously and be proactive in
protecting ourselves and our
organizations. By following best
practices for cyber security, such
as using strong passwords
and limiting access to important
systems, we can reduce the risk of
falling victim to cyber attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy