Introduction To Computer Crimes
Introduction To Computer Crimes
101,833,938 M
(est. 2014 population)
Source: NATIONAL STATISTICS
ONLINE OFFICE
PENETRATION
Roughly 44M or 41%
internet users in the
Philippines in 2014
Source:
FACTBROWSER
THE PHILIPPINE CYBERSPACE
MOBILE PENETRATION
5.21 M
93.2 Million
Twitter users Mobile Subscribers
Ranked # 8 SMS Capital of
Globally the World
Source: http://www.countryranker.com/ Source: MVFGLOBAL
30.66 Million
Facebook AVERAGE TIME SPENT ONLINE
users 18.6 HOURS on
Ranked # 8 Globally; # 3 in Asia internet usage
Source: http://www.countryranker.com/ Source: INFOEVOLVE.PH
Top 5 PHILIPPINE ONLINE BEHAVIOR
Because –
- Everybody is using COMPUTERS.
- From white collar criminals to terrorist
organizations And from Teenagers to Adults.
- Conventional crimes like Forgery, extortion, kidnapping
etc. are being committed with the help of computers
- New generation is growing up with computers.
- Monetary transactions are moving on to the
INTERNET.
What makes Cyber Crime
Different?
IN SHORT
Computer is a target.
Computer is a tool of crime
Computer is incidental to crime
Profile of Cyber Criminals
• Disgruntled employees.
• Teenagers.
• Political Hacktivist.
• Professional Hackers.
• Business Rival.
• Ex-Boy Friend.
• Separated Husband. etc
Victims
• Gullible
• Desperados and greedy people
• Unskilled & Inexperienced
• Unlucky people
Types of Cyber Crime
(This is not exhaustive list of cyber crime)
Zombie - In computer
science, a zombie is
a computer
connected to the
Internet that has
been compromised
by a hacker,
computer virus or
trojan horse program
and can be used to
perform malicious
tasks of one sort or
another under remote
direction.
Malware Dissemination
From : *****Bank[mailto:support@****Bank.com]
Sent :08 June 2004 03:35
To : India
Subject: Official information from ***** Bank
• What is Ransomware?!
– Malware that can hold your computer and/or its
data hostage
– Your computer and/or data is “freed” in exchange
for money
• Premium SMS
• Bitcoin
• Western Union
• Two general types:
– Lock screen
– Encrypting ransomware
How did this happen?!