crime type 2 - cybercrime Flashcards
What are some examples of cyber crime? 10 examples
• Malware: viruses and ransomware
• Cryptojacking
• Data breach
• Distributed DoS attacks (DDoS)
• Phishing and spear-phishing
• E-commerce frauds
• Cyberespionage
• Selling illegal items online
• Soliciting, producing, or possessing child pornography.
• Using encrypted apps to organize a robbery
Define cyber dependent
Offences that can only be committed by using a computer, computer networks or other ICT
- spread of viruses
- distributed denial of service attacks (DDoS)
Define cyber enabled
Traditional crimes that are increased In their scale or reach by using a computer, computer networks or other ICT
- phishing emails
- selling drugs on crypto markets
define cyber assisted
To assist the commission of traditional crimes (e.g. to gather information or to communicate)
- use of encrypted apps to communicate between co-offenders
What is malware?
Examples
Software designed to interfere with a computers normal functioning
- blanket term for viruses, trojans and other destructive computer programs
Examples:
- ransomware
- botnets
- Trojans
- worms
What is cryptojacking?
Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware.
What is data breach?
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.
What is distributed denial of service attacks?
In a distributed denial-of-service (DDoS) attack, multiple compromised computer systems attack a target and cause a denial of service for users of the targeted resource. The target can be a server, website or other network resource
What is phishing?
The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is spear phishing?
While phishing attacks target anyone who might click, spear phishing attacks try to fool people who work at particular businesses or in particular industries in order to gain access to the real target: the business itself
what are e commerce frauds?
when scammers intercept a commercial transaction on a ecommerce store with the goal of personal or financial gain
- also known as payment fraud, in which scammers steal money from either the customer, the merchant or both
what is cyberespionage?
-type of cyberattack in which unauthorised user attempts to access sensitive or classified data or intellectual property for economic gain, competitive advantage or political reasons
- its the intention of stealing data, info, or intellectual property from or through computer systems
why do criminals use encrypted apps?
- encryption allows you to communicate in secrecy through open forum such as computer bulletin boards and internet websites
list 3 types of targets of cybercrime and what type of attacks will affect them
- individual users
- more likely to be victims of minor cyberattacks e.g. online harassment - corporate
- suffer more serious crime e.g. DDos attacks - states
- life threatening attacks against critical infrastructures
list 3 types of cybercrime associated with machines/computers
- crimes against the machine/ computer integrity
- viruses
-DDoS - crime using machines
- phishing - crime in the machine
- illegal pornographic material
how do we measure/ count cybercrime?
- police recorded crime
- victimisation surveys
- vendor databases
why is there underreporting in police recorded crime?
- not perceiving that what had taken place was a crime
- individuals not realising that they are victims of cybercime
- not knowing where to report
- believing that the police cannot do anything
- embarrassment (romantic scams, sexual offending against children, online harassment)