Sie sind auf Seite 1von 3

Notes in CDI 4 Organized Crime Investigation (Finals)

Topic: Cybercrime
Instructor: Queen Vi Benedicto

CYBER CRIME

"Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm
the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)".

There are crimes that are only committed while being on the Internet and are created exclusively because of the World
Wide Web.

History of CYBER CRIME

The first recorded cybercrime took place in the year 1820! In 1820, Joseph-Marie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This
resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the
first recorded cybercrime!

Who are CYBER CRIMINALS?

• Kids (age group 9-16 etc.)


• Organized hacktivists
• Disgruntled employees
• Professional hackers

Other types of CYBER CRIMINALS

Categories of CYBER CRIME

We can categorize cybercrime in two ways:-

1. The computer as a Target: - using a computer to attack other computers . e.g. hacking , virus/worm attacks etc.
2. The computer as a Weapon: - using a computer to commit real world crimes. e.g. cyber terrorism , credit card
frauds , pornography etc.

Types of CYBER CRIME

1. HACKING
2. VIRUS ATTACK
3. CREDIT CARD FRAUD
4. PHISHING
5. CYBER DEFAMATION
6. SOFTWARE PIRACY
7. NET EXTORTION
8. SPOOFING
9. IRC CRIME

HACKING
 Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the
creator's original purpose.
 The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and
philosophy of their choice, is called a hacker.

VIRUS ATTACK

 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and
runs against your wishes.
 Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make
a copy of itself over and over again is relatively easy to produce.
 Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a
halt.
 An even more dangerous type of virus is one capable of transmitting itself across networks and
bypassing security systems.

CREDIT CARD FRAUD

 When an individual uses another individuals’ credit card for personal reasons while the owner of the card and
the card issuer are not aware of the fact that the card is being used.
 Further, the individual using the card has no connection with the cardholder or issuer, and has no intention of
either contacting the owner of the card or making repayments for the purchases made.

PHISHING

 Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details
(and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
 Phishing emails may contain links to websites that are infected with malware.
 Phishing is typically carried out bye email spoofing or instant messaging and it often directs users to enter
details at a fake website whose look and feel are almost identical to the legitimate one.

CYBER DEFAMATION

 The term defamation is used to define the injury that is caused to the reputation of a person in the eyes of a
third person.
 The injury can be done by words oral or written, or by signs or by visible representations.
 Cyber defamation is a new concept but the traditional definition of the term defamation is application to the
cyber defamation as it involves defamation of a person through a new and a virtual medium.
 Cyber defamation is publishing of defamatory material against another person with the help of computers or
internet.
SOFTWARE PIRACY

 A term used to describe the act of illegally using, copying or distributing software without purchasing the
software or having the legal rights.
 The majority of software purchased today is purchased as a one-site license, meaning that only one computer
may have that software installed on it at one time.
 Copying that software to multiple computers or sharing it with your friend without multiple licenses is
considered illegal and is considered software piracy..

NET EXTORTION

Internet extortion is hacking into and controlling various industry databases (or the threat of), promising to release
control back to the company if funds are received or some other demand is satisfied. Similarly, the subject will threaten
to compromise information about consumers in the industry database unless funds are received.

INTERNET RELAY CHAT (IRC)

Internet Relay Chat (IRC) is a form of real-time Internet chat. It is mainly designed for group (many-to-many)
communication in discussion forums called channels, but also allows one-to-one communication via private message.
 Criminal use it for meeting co-conspirators.
 Hackers use it for discussing their exploits / sharing the techniques.
 Paedophiles use chat rooms to allure small children.

SPOOFING

The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving
computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of
another user on the Internet.
Spoofing can take place on the Internet in several different ways:-
 E-mail Spoofing
 IP Spoofing
 Fake Identity

IDENTITY THEFT
Identity theft rarely involves the unauthorised taking of a victim’s personal possessions, however it does involve the
perpetrator of the crime taking the victim’s personal information and then using this in an unauthorised way for their
own personal gain.

CYBER CRIME
sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages
with another person via the Internet.

CYBERBULLYING
is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through
SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share
content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else.

TOP 10 STEPS TO HELP STOP CYBERCRIME

1. Education
2. Use a firewall
3. Click with caution
4. Practice safe surfing
5. Practice safe shopping
6. Use comprehensive security software and keep your system updated
7. Secure your wireless network
8. Use strong passwords
9. Use common sense
10. Be suspicious

Das könnte Ihnen auch gefallen