225-C18 - Cybercrime and Cyberdeviance Flashcards
Cybercrime
AKA…?
Illgeal activities carried out with a computer over a network (e.g. internet)
AKA computer crime
Name 2 examples of activities that constitute cybercrime:
- phishing
- ripping
- hacking
- luring
- stalking
- spamming
- skimming
- trafficking
- software piracy
- identity theft/fraud
- cyberterrorism
Phishing.
The use of misleading or counterfeit electronic transmissions, such as emails purportedly from credit card companies or other financial institutions, requesting sensitive personal information or password data, with the intention of compromising the victim’s banking or credit accounts.
e.g. “You are $284 dollars above credit. Please click here to learn more”
Ripping
The use of specially designed software or other methods of circumventing copyright protection for the purposes of downloading or copying original material from a protected media source (DVD, online video, etc.) to a hard disk, usually for the purpose of resale or redistribution.
Hacking
The attempt to remotely circumvent the security or privacy measures initiated by an Internet website, server, or database, for the purposes of either stealing information or interfering with operations and compromising data through distributed denial-of-service attacks, deployment of viruses, or other malicious actions.
Luring
the act of using an Internet connection to access social media, chat rooms, or other places of electronic assembly to make contact with a child or person under 16 for the purposes of counselling them to commit a sexual act or to meet at a physical location for sexual purposes. This is typically accomplished by the offender posing online as an underage person himself in order to conceal his real identity and intentions.
Stalking
The use of a computer or other network-enabled device to repeatedly make unwanted contact with a person using any number of means (e-mails, text messages, etc.), and doing so knowing that this behaviour is likely to cause fear or annoyance.
Spamming
The use of one or more computer networks and servers to send unsolicited and unwanted bulk messages to other users, often consisting of vexatious advertisements or pornographic content delivered either by e-mail or by pop-up windows in Internet browsers.
Skimming
The use of specific software and hardware to intercept e-transmissions containing sensitive financial data, usually related to credit card purchases. The stolen data enable the cloning or counterfeiting of specific financial instruments (credit cards, bank cards, etc.) for the purposes of theft and fraud.
Trafficking
Any use of a computer network to move illicit images (or other media), controlled substances, or people. In the context of cybercrime, trafficking can include examples like distributing child pornography; selling or distributing drugs via the portion of the “Deep Web” known as the “Dark Web”; or making contact with victims to “groom” them for human trafficking operations—essentially another version of luring but with different objectives and victims.
Software piracy
Software Piracy is the illegal approach of acquiring, sharing, copying, distributing, modifying, selling, or using the software which is legally protected by means of the Internet. This can also be done online (online software piracy) or offline (face-to-face software piracy). Software piracy is the equivalent of theft and is, therefore, a crime. Examples of both online and offline software piracy: an end-user installing a single-use license on multiple computers, a holidaymaker buying a pirated copy of a piece of software in the Far East where they engage in mass distribution of illegally obtained software.
Identity theft or identity fraud
are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In today’s advancements in technology, most of identity theft cases occurs online. Examples include stealing or exploiting personal information—such as your Social Security Number, bank account number, and credit card information etc for economic gain.
Cyberterrorism
Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government and the public in furtherance of political or social objectives. Examples include cyberterrorists targeting a water treatment plant, causing a regional power outage or disrupting a pipeline, oil refinery or fracking operation. Cyberterrorism is a type of cyber attack just like cyberespionage in which hackers attempt to gain access to sensitive or confidential data/information of a business or government entity for economic gain, competitive advantage or political reasons.
who defined cybercrime as “Any criminal offence or series of offences committed through the use of a computer and a computer network or Internet connection”?
Moore
Definition of Cyberterrorism according to Baranetsky
using a computer to orchestrate large-scale “attacks on information,” including government or critical infrastructure servers or any database of interest to national security