0% found this document useful (0 votes)
182 views28 pages

Types of Cybercrimes

In various aspects, ICT and technology as a whole brought us comfort and convenience in life. However, aside from those successes are the downfalls of users.

Uploaded by

marry joy Aloba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views28 pages

Types of Cybercrimes

In various aspects, ICT and technology as a whole brought us comfort and convenience in life. However, aside from those successes are the downfalls of users.

Uploaded by

marry joy Aloba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Cybercrime

Criminal activities / acts done through the use


of the computers or the internet to commit an
offense or to access personal information,
business trade secrets or the use of the internet
for exploitative or malicious purposes.
Most Common Cybercrimes
(Stephen Nale)

Non-Delivery
Phishing Blackmail Sports
Hacking of
/Spoofing /Extortion Betting
Merchandise

Criminal
Electronic Child Drug
Prostitution Copyright
Harrasment Pornography Trafficking
Infringement
Phishing /Spoofing
This is the act of sending multiple emails to multiple
users in hopes of having a number of them clicking the links
or malwares attached to the email. Most email services today
have spam or bulk folders that automatically put these
suspicious emails to that folder. However, this is not 100%
accurate that some emails are not filtered and some other
emails that are legitimate end up on the spam folder.
Blackmail /Extortion
This is the act of using the internet to threaten or
damage someone’s reputation to extort money or
anything else of value.
The victims of this act tend to have posted something
“inappropriate” over the internet even if they put it in a
secured location
Hacking
The act of obtaining
unauthorized access to data
from a computer network or
a computer user.
3 types of Hackers (study.com)

• Black Hat Hacker


• White Hat Hacker
• Grey Hat Hacker
3 types of Hackers (study.com)
• Black (crackers)– hacks for malicious and stealing information
purposes
• White (Ethical hackers) – the one who is ethical that hacks for
defensive purposes. Ethical hacking is not illegal and they are hired
to test the vulnerability of a system
• Grey – Blend of black and white hackers. They act without
malicious intent but for their fun. They hack to weaken or to
threaten the user or a network.
Sports Betting
The act of wagering on any
sports event over the internet.
Non – Delivery of Merchandise
(Online Scam)
The act of devising a scheme wherein a
culprit posts an item or service for sale on
the internet and once the transactions have
been done, does not really give the item or
service
Electronic Harassment
The act of anonymously using the internet
to harass, abuse, threaten or annoy other
people. It is also an act of cyberbullying
however, because the culprit is anonymous,
it is hard to detect who is bullying you.
Child Pornography

The act of using the internet to


show child pornography. This
act is highly punishable by law.
Prostitution

The act of using the internet to


engage in sexual activity in
exchange of payment/money
Drug Trafficking

The act of selling illegal


substances using the internet
Criminal Copyright
Infringement
The act of piracy mainly for financial
gain. PirateBay, was raided for the
second time due to years of pirating
movies, music, games, books, and
other software.
Activity
True or False
1. Phishing is the act of faking email
messages to get personal information
from the internet users.
True or False
2. Spoofing is the act of obtaining
unauthorized access to data from a
user or computer network
True or False
3. Extortion is the act of using the
Internet to threaten or damage
someone’s reputation to extort
money or anything else of value
True or False
4. Limeware was raided for the
second time due to years of
pirating movies, music, games,
books, and other software.
True or False
6. Non delivery of service is the act of
devising a scheme wherein a culprit posts
an item or service for sale over the internet,
and once the transactions have been done,
does not give the item or service
True or False

7. Wager gambling is the act of


betting on any sports event over
the internet.
True or False

8. Most email services today have


spam or bulk folder that
automatically puts suspicious
emails to that folder
True or False
9. Blackmailing means tricking or
deceiving computer systems or
other computer users by faking the
identity of another user on the
internet.
True or False
10. Prostitution is the act of using
the internet to show children’s
sexual activities over the internet.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy