Kinds of cybercrime (Social Networking for Social integration .pptx
DavidsonTuban
67 views
57 slides
Aug 06, 2024
Slide 1 of 57
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
About This Presentation
Kinds of Cybercrime topic.
Size: 25.07 MB
Language: en
Added: Aug 06, 2024
Slides: 57 pages
Slide Content
CYBER CRIME
Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. What is a cybercrime?
Who does cybercrime happen to? Cybercrime can be targeted at any individual or organization of any size that has assets in the cyberspace. It is perpetuated by cybercriminals for monetary gain or other malicious intent.
How many cyber crimes are committed each year? With over 2328 attacks per day, an average of 8, 00,000 occur in a year and on average, there is a hacker attack every 39 seconds . It is estimated that 2023 will face around 33 billion account breaches.
Cybercrimes can generally be divided into two categories: 1. Crimes that target networks or devices Viruses Malware Denial-of-Service (DoS) Attack 2. Crimes using devices to participate in criminal activities Phishing Emails Cyberstalking Identity Theft
CATEGORIES OF CYBERCRIME 1. Property 2. Individual 3. Government
1. Property The hacker steals a person’s bank details to gain access to funds, make purchases online or run phishing scams to get people to give away their information. They could also use a malicious software to gain access to a web page with confidential information.
2. Individual This category of cybercrime involves one individual distributing malicious or illegal information online. This can include cyberstalking, distributing pornography and trafficking.
3. Government A crime against the government is also known as cyber terrorism. Government cybercrime includes hacking government websites, military websites or distributing propaganda. These criminals are usually terrorists or enemy governments of other nations.
Cybercrime Law Republic Act No. 10175 “ Cybercrime Prevention Act of 2012 ”
TYPES OF CYBERCRIME
I s an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. 1.Denial-of-Service (DoS) attack
I s a DoS attack that uses multiple computers or machines to flood a targeted resource. Distributed Denial-of-Service (DDoS) attack
Republic Act No. 10175
Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service or network. 2. Malware
Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s computer. They are readymade tools criminals can buy online and use against anyone with a computer. 4. Exploit Kit
PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps . 5. Pontential Unwanted Programs (PUPS)
Examples: 1. Ask toolbar
Examples: 2. Babylon toolbar
These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” 6. Online scams
Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. 7. Botnets
A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person. 8. Phishing
Identity theft happens when someone takes your name and personal information (like your social security number) and uses it without your permission to do things like open new accounts, use your existing accounts, or obtain medical services. 9. Identity Theft
Cryptojacking is a type of cybercrime that involves the unauthorized use of people's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency. 10. Cryptojacking
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted. 11. Cyberbullying
Software piracy is the act of illegally using, copying, modifying, distributing, sharing, or selling computer software protected by copyright laws. A software pirate is anyone who intentionally or unintentionally commits these illegal acts. 12. Software Piracy
C yberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal". 13. Cyberterrorism
A man-in-the-middle (MITM) attack is a cyber attack in which a threat actor puts themselves in the middle of two parties, typically a user and an application, to intercept their communications and data exchanges and use them for malicious purposes like making unauthorized purchases or hacking. 14. Man-in-the-middle attack
I s a technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking can take many forms, including: harassment, embarrassment and humiliation of the victim. 15. Cyberstalking
Social engineering refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons. 16. Social Engineering
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. 17. Data Breach
is the live-streaming sexual exploitation of children viewed over the internet. Pedophiles and predators anywhere in the world can now search online and wire a secure payment to an adult who sets up the show. 18. Cybersex Trafficking
One of the less common cybercrimes that are also growing to become more popular is the fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data. 19. Online Recruitment Fraud
Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online, especially on what is known as the "Dark Web". 20. Online Drug Trafficking
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Darkweb
Electronic money provides an easy way to transfer value without revealing its identity, such as untraceable banknotes. I nvolves disguising financial assets so they can be used without detection of the illegal activity that produced them. 21. Electronic Money Laundering
I s an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website. Attackers often initiate an XSS attack by sending a malicious link to a user and enticing the user to click it. 23. Cross-Site Scripting
When creating a password, use letters, numbers, and symbols. Avoid using common phrases or words, and never use the same password for multiple accounts. 1. Use Strong Passwords.
It is crucial to keep your computer’s software up to date by installing security updates and patches as soon as they become available. Doing so will help protect against known vulnerabilities that hackers can exploit. 2. Your Software Up to Date..
If you have a Wi-Fi network at home, secure it with a strong password. This will prevent unauthorized users from accessing your network and potentially steal sensitive information. 3. Secure Your Wi-Fi.
Always be cautious when clicking on links in emails or social media messages. If the link appears suspicious or unfamiliar, do not click on it. 4. Be Careful When Clicking on Links.
Two-factor authentication adds an extra layer of security to your accounts by requiring a second form of identification, such as a phone number or email address. This makes it much more difficult for cybercriminals to access your accounts. 5. Use Two-Factor Authentication.
Most social media platforms and other online services offer privacy settings that can help protect your personal information. Make sure to enable these settings to keep your information private. 6. Enable Privacy Settings.
When using the internet, be cautious when sharing personal information, such as your address, phone number, or social security number. Only share this information when it is necessary and with trusted sources. 7. Be Careful When Sharing Personal Information.
Antivirus software protects your computer against viruses, malware, and other malicious software. Make sure to use a reputable antivirus program and keep it updated regularly. 8. Use Antivirus Software.
A virtual private network (VPN) is a tool that can help protect your online privacy by encrypting your internet connection. This makes it much more difficult for cybercriminals to intercept your data. 9. Use a VPN.
One of the most important things you can do to protect yourself against cybercrimes is to educate yourself on the latest threats and trends. Stay up to date through reliable sources, such as cybersecurity blogs and news websites. 10. Educate Yourself.