Kinds of cybercrime (Social Networking for Social integration .pptx

DavidsonTuban 67 views 57 slides Aug 06, 2024
Slide 1
Slide 1 of 57
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57

About This Presentation

Kinds of Cybercrime topic.


Slide Content

CYBER CRIME

Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. What is a cybercrime?

Who does cybercrime happen to? Cybercrime can be targeted at any individual or organization of any size that has assets in the cyberspace. It is perpetuated by cybercriminals for monetary gain or other malicious intent.

How many cyber crimes are committed each year? With over 2328 attacks per day, an average of 8, 00,000 occur in a year and on average, there is a hacker attack every 39 seconds . It is estimated that 2023 will face around 33 billion account breaches.

Cybercrimes can generally be divided into two categories: 1. Crimes that target networks or devices Viruses Malware Denial-of-Service (DoS) Attack 2. Crimes using devices to participate in criminal activities Phishing Emails Cyberstalking Identity Theft

CATEGORIES OF CYBERCRIME 1. Property 2. Individual 3. Government

1. Property The hacker steals a person’s bank details to gain access to funds, make purchases online or run phishing scams to get people to give away their information. They could also use a malicious software to gain access to a web page with confidential information.

2. Individual This category of cybercrime involves one individual distributing malicious or illegal information online. This can include cyberstalking, distributing pornography and trafficking.

3. Government A crime against the government is also known as cyber terrorism. Government cybercrime includes hacking government websites, military websites or distributing propaganda. These criminals are usually terrorists or enemy governments of other nations.

Cybercrime Law Republic Act No. 10175 “ Cybercrime Prevention Act of 2012 ”

TYPES OF CYBERCRIME

I s an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. 1.Denial-of-Service (DoS) attack

I s a DoS attack that uses multiple computers or machines to flood a targeted resource. Distributed Denial-of-Service (DDoS) attack

Republic Act No. 10175

Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service or network. 2. Malware

Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s computer. They are readymade tools criminals can buy online and use against anyone with a computer. 4. Exploit Kit

PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps . 5. Pontential Unwanted Programs (PUPS)

Examples: 1. Ask toolbar

Examples: 2. Babylon toolbar

These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” 6. Online scams

Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. 7. Botnets

A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person. 8. Phishing

Identity theft happens when someone takes your name and personal information (like your social security number) and uses it without your permission to do things like open new accounts, use your existing accounts, or obtain medical services. 9. Identity Theft

Cryptojacking is a type of cybercrime that involves the unauthorized use of people's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency. 10. Cryptojacking

Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted. 11. Cyberbullying

Software piracy is the act of illegally using, copying, modifying, distributing, sharing, or selling computer software protected by copyright laws. A software pirate is anyone who intentionally or unintentionally commits these illegal acts. 12. Software Piracy

C yberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal". 13. Cyberterrorism

A man-in-the-middle (MITM) attack is a cyber attack in which a threat actor puts themselves in the middle of two parties, typically a user and an application, to intercept their communications and data exchanges and use them for malicious purposes like making unauthorized purchases or hacking. 14. Man-in-the-middle attack

I s a technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking can take many forms, including: harassment, embarrassment and humiliation of the victim. 15. Cyberstalking

Social engineering refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons. 16. Social Engineering

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. 17. Data Breach

is the live-streaming sexual exploitation of children viewed over the internet. Pedophiles and predators anywhere in the world can now search online and wire a secure payment to an adult who sets up the show. 18. Cybersex Trafficking

One of the less common cybercrimes that are also growing to become more popular is the fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data. 19. Online Recruitment Fraud

Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online, especially on what is known as the "Dark Web". 20. Online Drug Trafficking

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Darkweb

Electronic money provides an easy way to transfer value without revealing its identity, such as untraceable banknotes. I nvolves disguising financial assets so they can be used without detection of the illegal activity that produced them. 21. Electronic Money Laundering

I s an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website. Attackers often initiate an XSS attack by sending a malicious link to a user and enticing the user to click it. 23. Cross-Site Scripting

When creating a password, use letters, numbers, and symbols. Avoid using common phrases or words, and never use the same password for multiple accounts. 1. Use Strong Passwords.

It is crucial to keep your computer’s software up to date by installing security updates and patches as soon as they become available. Doing so will help protect against known vulnerabilities that hackers can exploit. 2. Your Software Up to Date..

If you have a Wi-Fi network at home, secure it with a strong password. This will prevent unauthorized users from accessing your network and potentially steal sensitive information. 3. Secure Your Wi-Fi.

Always be cautious when clicking on links in emails or social media messages. If the link appears suspicious or unfamiliar, do not click on it. 4. Be Careful When Clicking on Links.

Two-factor authentication adds an extra layer of security to your accounts by requiring a second form of identification, such as a phone number or email address. This makes it much more difficult for cybercriminals to access your accounts. 5. Use Two-Factor Authentication.

Most social media platforms and other online services offer privacy settings that can help protect your personal information. Make sure to enable these settings to keep your information private. 6. Enable Privacy Settings.

When using the internet, be cautious when sharing personal information, such as your address, phone number, or social security number. Only share this information when it is necessary and with trusted sources. 7. Be Careful When Sharing Personal Information.

Antivirus software protects your computer against viruses, malware, and other malicious software. Make sure to use a reputable antivirus program and keep it updated regularly. 8. Use Antivirus Software.

A virtual private network (VPN) is a tool that can help protect your online privacy by encrypting your internet connection. This makes it much more difficult for cybercriminals to intercept your data. 9. Use a VPN.

One of the most important things you can do to protect yourself against cybercrimes is to educate yourself on the latest threats and trends. Stay up to date through reliable sources, such as cybersecurity blogs and news websites. 10. Educate Yourself.