Unit-3 Lesson 4 Cyber Security
Unit-3 Lesson 4 Cyber Security
Lesson-4
Tools and Methods
Used in Cybercrime
Chapter 4
Tools and Methods Used in
Cybercrime
Introduction
As the Internet and computer networks are integral parts of information systems, attackers have
in-depth knowledge about the technology and/or they gain thorough knowledge about it.
Phishers work in the following ways: (1) Planning (decide the target), (2) Setup (create methods for
delivering the message and to collect the data about the target), (3) Attack (phisher sends a phony
message), (4) Collection (record the information of victims), (5) Identity theft and fraud (use the
information that they have gathered to make illegal purchases or commit fraud).