PPT2 What Is Cybercrime
PPT2 What Is Cybercrime
Introduction
• Cybercrime is
defined as a crime
in which a
computer is the
object of the crime
(hacking, phishing,
spamming) or is
used as a tool to
commit an offense
(child pornography,
hate crimes).
History of Cybercrime
• The first recorded cybercrime took place in
1820. Considering the fact that the abacus,
which is thought to be the earliest form of
computer, has bee around 3500 B.C.
• Pornographic websites;
Online distribution,
Exploiting of children
Email Spoofing
• An authorized program
which functions from
inside what seems to be
an authorized program,
thereby concealing what
it is actually doing.
Web Jacking
• Hacking designed to
cause terror. Like
conventional terrorism, ‘e-
terrorism’ is utilizes
hacking to cause violence
against persons or
property, or at least cause
enough harm to generate
fear.
CLASSIFICATION OF
COMPUTER CRIMES
Financial fraud crimes
• Financial fraud can be broadly defined as an
intentional act of deception involving financial
transactions for purpose of personal gain.
• Fraud is a crime, and is also a civil law
violation.
Internet fraud
• Means trying to trick or scam someone else
using the Internet.
• This usually means that the person who is
being tricked loses money to the people
scamming them.
• Internet fraud can take place on computer
programs such as chat rooms, e-mail,
message boards, or Web sites.
Computer fraud
• Is any dishonest misrepresentation of fact
intended to let another to do or refrain from
doing something which causes loss.
• In this context, the fraud will result in obtaining
a benefit by:
– Altering in an authorized way.
– Altering, destroying, suppressing, or stealing
output, usually to conceal unauthorized
transactions.
– Altering or deleting stored data;
Other forms of fraud using computer
• Bank fraud – is the use of potentially illegal
means to obtain money, assets, or other
property owned or held by a financial
institution, or to obtain money from depositors
by fraudulently posing as a bank or other
financial institution.
• For this reason, bank fraud is sometimes
considered a white-collar crime.
Other forms of fraud using computer
• Carding – is a form of credit card fraud in
which a stolen credit card is used to change
pre-paid cards.
• Carding typically involves the holder of the
stolen card purchasing store-branded gift
cards, which can then be sold to others or
used to purchase other goods that can be sold
for cash.
Other forms of fraud using computer
• Identity theft – also known as identity fraud, is
a crime in which an imposter obtains key
pieces of personally identifiable information,
such as Social Security or driver’s license
numbers, in order to impersonate someone
else.
Other forms of fraud using computer
• Extortion – (also called shakedown,
outwrestling and exaction) is a criminal
offense of obtaining money, property, or
services from an individual or institution,
through coercion
Other forms of fraud using computer
• Theft of classified information
– Classified information is sensitive information to
which access is restricted by law or regulation to
particular classes of people.
– A formal security clearance is required to handle
classified documents or access classified data.
– The operation of assigning the level of sensitivity to
data is called classification.
Categories of Cybercrime
• We can categorize cybercrime in two ways.
• The computer as a target - using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
• The computer as a weapon – using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
pornography etc.
Computer as a target
• These crimes are committed by a selected
group of criminals.
• Unlike crimes using the computer as a tools,
these crimes require the technical knowledge
of the perpetrators.
• Crimes that primarily target computer
networks or devices include:
– Computer viruses
– Denial-of-service attacks
– Malware (malicious code)
Computer as a tool
• When the individual is the main target of
cybercrime, the computer can be considered
as the tool rather than the target.
• These crimes generally involve less technical
expertise. Human weaknesses are generally
exploited.
• These are the crimes which have existed for
centuries in the offline world.
• Scams, theft, and the likes have existed even
before the development in high-tech
equipment.
What does Spamming mean?
• Spamming is the use of electronic messaging
systems like e-mails and other digital systems
and broadcast media to send unwanted bulk
messages indiscriminately.
• The term spamming is also applied to other
media like in internet forums, instant
messaging, and mobile text messaging, social
networking spam, junk fax transmissions,
television advertising and sharing network
spam.
Phishing
• Phishing is mostly propagated via email.
• Phishing emails may contain links to other
websites that are affected by malware. Or,
they may contain links to fake online banking
or other websites used to steal private account
information.
• Phishing is the fraudulent attempt to obtain
sensitive information such as usernames,
passwords and credit card details by
disguising oneself as a trustworthy entity in an
electronic communication.
Obscene or offensive content
• The content of websites and other electronic
communications may be distasteful, obscene
or offensive for a variety of reasons.
• One area of Internet pornography that has
been the target of the strongest efforts at
curtailment is child pornography, which is
illegal in most jurisdictions in the world.
Drug trafficking
• Darknet markets are used to buy and sell
recreational drugs online.
• Some drug traffickers use encrypted
messaging tools to communicate with drug
mules.
• The dark web site Silk Road was a major
online marketplace for drugs before it was
shut down by law enforcement.
• After Silk Road 2.0 went down, Silk Road 3
Reloaded emerged.
Effects of Cybercrime on society
• Cybercrime against people: This includes a
wide variety of offenses. Criminals will hide
behind fake promotions, offers, giveaways etc.
while giving you the illusion of security to get
you to give up your personal information.
• Cybercrime against property: basically
involves the infiltration of computers with
malicious software through websites, email or
personal chats. These malware attacks could
be just to destroy someone’s computer or to
steal information from them.
Effects of Cybercrime on society
• Cybercrime against businesses: These
happen when the perpetrators hack into the
systems of the companies in question. Most
businesses store their sensitive information on
servers and the data may or may not be
financial in nature. Hackers who can gain
access into the systems of these companies
get access to all the information available in
these files. They can choose to destroy or leak
them, or where money is concerned transfer
funds from an organization to someone else’s
account.
Effects of Cybercrime on society
• Cybercrime against governments: Cyber
criminals can attack organizations of any kind
and government organizations are not an
exception the secure database of a
government agency can be hacked with the
intension to misuse sensitive information and
the term “cyber-terrorism” is often used in this
context.
Remember!