Group 2 Cdi 9
Group 2 Cdi 9
AND INTERNET
CRIMES
Chapter 2
COVERAGE:
1.Define and concepts of
cybercrime.
2.Why computer incidents are
prevalent.
3.Types of computer attacks.
4.Classification of perpetrators
of computer crime.
5.Phases of cybersecurity
attacks.
CYBERCRIME
■Is any criminal offense that involves a
computer and a network.
■Some of the aspects that computer criminals
can be dangerous:
1. Human Threat
2. Organizational Threat
3. Group Threat
4. National Security Threat
WHY COMPUTER INCIDENTS ARE
PREVALENT?
■Increasing complexity increases
vulnerability
■Higher computer user expectations
■Technological Advancement introduces new
risks
■Increase reliance on commercial software
with known vulnerabilities
■Bringing your own device (BYOD) policy
■Delay in software updates
CLASSIFICATION OF
PERPETRATORS OF
COMPUTER CRIME
1. Hackers
■They do it out of scientific curiosity
and see how they can get access to
information systems and how far
they can go.
2. Crackers
■They hack into other
people’s networks
and systems to do
things like deface
web sites, crash
computer, distribute
malicious programs or
hateful messages and
write scripts and
automated programs
3. Malicious Insiders
■They are often
granted access
to the networks
they misuse,
they are
incredibly
difficult to track
or avoid.
4. Industrial Spies
■They procure trade secrets from
their sponsor’s rivals by
fraudulent means. Theft of
innovative product ideas,
manufacturing records, marketing
documents, or new tech source
code are all examples of
industrial espionage.
5. Cyber Criminals
■The opportunity for material gain
motivates cyber Criminals. They rob
by breaking into company servers
and converting funds from one
account to another. They stole and
resold credit card numbers, personal
names and cellphone IDs.
6. Cyberterrorist
■Conducts a computer-based
assault against other computers
and networks in an effort to
intimidate or coerce a nation. They
employ tactics to destroy or
interrupt networks in order to
inflict damage rather than gather
information.
CLASSIFICATION
OF HACKERS
1. White Hat Hackers
■Often referred to as “ethical hackers”
■They never plan to damage a device;
rather, they aim to discover vulnerabilities
in a computer or network system.
■Ethical hacking is one of the most difficult
jobs in the IT industry.
2. Black Hat Hackers