2. What is Cybercrime?
Refers to all the activities done with criminal
intent in cyberspace.
Refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
4. When computers and networks came
into being in the 1990s, hacking was
done basically to get more
information about the systems.
As hackers became more skilful, they
started using their knowledge and
expertise to gain benefit by exploiting
and victimizing others.
5.
6. Causes of Cybercrime
Accessing sensitive information and
data and using it means a rich
harvest of returns Hence, this has
led to a rise in cyber crime across the
world.
8. Fraud and Financial
Crimes
Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss. Result in
obtaining a benefit by:
Altering in an unauthorized way.
10. Cyber Terrorism
Cyber Terrorism in general, can be
defined as an act of terrorism
committed through the use of
cyberspace or computer resources.
11. A cyber terrorist is someone who
intimidates or coerces a government
or organization to advance his or her
political or social objectives by
launching a computer-based attack
against computers, networks, or the
information stored on them.
12. Cyber Extortion
Cyber extortion occurs when a
website, e-mail server, or computer
system is subjected to or threatened
with repeated denial of service or
other attacks by malicious hackers.
Hackers demand money in return for
promising to stop the attacks and to
offer "protection.”
16. Denial of Service (DoS)
Attack
Act by the criminal, who
floods the bandwidth of the
victim’s network.
In his e-mail box with spam
mail depriving him of the
services.
17. Cyber Stalking
This is a kind of online harassment
wherein the victim is subjected to a
barrage of online messages and
emails. Typically, these stalkers know
their victims and instead of resorting
to offline stalking, they use the
Internet to stalk to make the victims’
lives more miserable.
18. Identity Theft
In this cyber crime, a criminal
accesses data about a person’s bank
account, credit cards, Social Security,
debit card and other sensitive
information to steal money or to buy
things online in the victim’s name. It
can result in major financial losses for
the victim and even spoil the victim’s
credit history.
19. Malicious Software
These are Internet-based software or
programs that are used to disrupt a
network. The software is used to gain
access to a system to steal sensitive
information or data or causing
damage to software present in the
system.
20. Child soliciting and Abuse
This is also a type of cyber crime
wherein criminals solicit minors via
chat rooms for the purpose of child
pornography.
21. Computer Vandalism
Damaging or destroying data rather
than stealing.
Transmitting Virus
Cyber Terrorism
Use of Internet base attacks in
terrorist activities.
22. Software Piracy
Theft of software through the illegal
copying of genuine programs.
Distribution of products intended to
pass for the original.
25. Categories of Computer
Viruses
Boot Sector Viruses – infects the
boot record of a hard or floppy disk.
Cluster Viruses – this type of virus
make changes to a disk’s file system.
File-Infecting Viruses – this type of
virus infects program files on a disk
(such a EXE or COM files).
26. Categories of Computer
Viruses
Worms – a worm is a program
whose purpose is to duplicate itself. It
is commonly spread over the Internet
via e-mail message attachments and
Internet Relay Chat (ICR).
Bombs – this type of virus hides on
the user’s disk and waits for a
specific event to occur before
running.
27. Categories of Computer Viruses
Trojan Horses – is a malicious
program that appears to be friendly,
they are not technically viruses. But,
because they can do harm, they are
considered viruses.
Stealth Viruses – these viruses take
up residence in the computer’s
memory, making them hard to detect.
28. Categories of Computer
Viruses
Polymorphic, Self-Garbling, Self-
Encrypting, or Self-Changing
Viruses – this type of virus can
change itself each time it is copied,
making it difficult to isolate.
Macro Viruses – a virus designed to
infect a specific type of document file,
such as Microsoft Word or Excel files.