0% found this document useful (0 votes)
57 views7 pages

Cybercrime: - Kristyn Vaz and Riva Talwar

Cybercrime involves various illegal activities carried out through computers or online. This includes phishing, where attackers steal personal information by tricking users into opening malicious links; hacking, where hackers illegally access computers to steal data, money, or software; malware like viruses and spyware that harm networks; and identity theft, where criminals steal identities to commit fraud.

Uploaded by

Mia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views7 pages

Cybercrime: - Kristyn Vaz and Riva Talwar

Cybercrime involves various illegal activities carried out through computers or online. This includes phishing, where attackers steal personal information by tricking users into opening malicious links; hacking, where hackers illegally access computers to steal data, money, or software; malware like viruses and spyware that harm networks; and identity theft, where criminals steal identities to commit fraud.

Uploaded by

Mia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Cybercrime

- Kristyn Vaz and Riva Talwar


This Photo by Unknown Author is licensed under CC BY-SA
l ware
phi ma
s hin
g

spam
spam

hacking

Identity theft
Phishing

• Phishing is a form of cybercrime in which a person can see and reveal


other peoples private information.
• Phishing allows an attacker to unlock the targets accounts, emails,
passwords, and other information derived from the target.
• The attacker can send fake links, and when you open them the hacker
might steal from your bank account, and will be able to see everything
while the target is still on the website.
• Phishing can be used to steal money, and phish other people within the
targets contacts or organization.
Hacking
• Hackers are computerphiles who illegally access other peoples
computer activity from inside their houses.
• Since technology advances, computer security has been a major
problem. Hackers are stealing peoples data, money from accounts
and software data for themselves illegally .
• Hacking involves the misuse of information from credit card numbers
and personal data to even more private information.
• Spam is a part of hacking, like spamming websites that allow the
hacker to track you.
Malware

• Malware is a term for computer viruses and other destructive


computer programs people design.
• It is any program or file that is intentionally harmful to a computer
network or software.
• Malware can take many forms/some of the malware types include-
spyware, ransomware, viruses, worms, and trojans.
• A trojan is a type of malware that fools a user into thinking that’s it is
a harmless file.
Identity Theft

• Identity theft is the crime of obtaining the personal or financial


information of another person
• Using their identity to commit fraud, such as making unauthorized
transactions or purchases.
• Criminals can use stolen information and open bank accounts or credit
card accounts in someone else’s name.
• Then they use these accounts to buy goods such as groceries, furniture
etc. or to steal money from banks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy