Tecnology and Cybercrime Flashcards

1
Q

Introduction

A

There is a change in the global landscape when it comes to crimes, security and wars and this is due to the increase in cyber incidents
This happens when more people start relying on cyber technology, which results in the improvement of information technology and this consequently leads to the escalation of the frequency and severity of cyber related incidents and attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of cybercrime

A

Cybercrime has existed from the early 1990s and is defined as any illegal act where a
computer, network or electronic device with a memory or processing capability is
the object or target of the crime;
the instrument used to commit the crime;
or used as a repository of evidence relating to a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two categories of cybercrime

A

New crimes= crimes that can only be committed with computers

Old crimes= Crimes that have existed for centuries but are now being committed in the cyber environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrime as part of the manmade risk in society

A

We refer to it as a risk society because society tries to organise itself as a response to the risk of cybercrime

Manmade risks are produced by the modernisation process, specifically
developments in technology

Manmade risks construct a risk society as they are very unpredictable as the
environments they create have little historical reference

The cyber threat landscape is changing as it has expanded over time and criminals
use more refined techniques
this changing landscape makes the crime difficult to police

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why cybercrime is becoming an increasing threat globally

A

Its an invisible enemy and is mostly anonyous

Chouhan states that because institutions, businesses, economic activities and
government organisations are becoming more dependent on the internet, cyber
criminals exploit numerous security issues that lead to many cybercrime variants
arising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some of the challenges with tech in preventing and solving crimes

A

Budget and maintenance
lack of training
Fear and resistance
Management
Capabilities and restrictions of certain techs
Improper usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methodologies

A

DATA COLLECTION
reviewing published peer reviewed articles and media reports and conducting targeted online searches

Selection of cyber incidents must be based on whether they affected SA citizens or organisations
whether impact caused a breach
The affected services
whether or not it lead to a financial loss

DATA ANALYSIS
Classified into incident types, affected sector, perpetrator type and motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident type

A
  1. COMPROMISED WEBSITE
    intentional or unintentional activity affecting the confidentiality integrity or availability of a website

CYBERCRIME
crime involving a computer, network or device causing financial impact

DATA EXPOSURE
The disclosure or leakage of data or information within a public domain

SYSTEM INTRUSION
The unauthorised or illegitimate access to systems or networks

DENIAL OF SERVICE
preventing authorised/ legitimate users from accessing network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sector affected

A

Classifying an incident ito area of economy which it occurred
most common is public sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perpetrator type

A

HACKTIVIST
Person/group of people affiliated with activists for political or social change

INSIDER
individual with a trusted relationship, institutional knowledge and legitimate access to a company or organisation but acts maliciously for personal gain

HACKER
A well-versed/ unskilled person who uses skills developed by elite computer users to break security or infiltrate information networks

CYBERCRIMINAL
individual/group affiliated to criminal groups for financial gain

NATION-STATE
State hired sophisticated hacker who targets the information systems or networks of other countries

NON-MALICIOUS HACKER
Person causing internal/ external disclosure of a security flaw or a vulnerability affecting the information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Motivation

A

POLITICAL
to promote political propaganda or a political crime

ECONOMIC
Illegal actions for financial gain

FUN/PERSONAL
desire to prove skills
to solve challenging problems
Expose security flaws

ACCIDENTAL
unintentional/ unexpected discovery of a security flaw

CRIMINAL
Conscious decision to actually conduct a wrongdoing but lacking financial incentive
High-tech crimes and financial wealth are interdependent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybercrime detection & the role of the police are crucial in the CJS

A

Compared to other sections of CJS, technology has the most far-reaching effect on
realm of policing

Technology and new ways of obtaining information has enhanced the capacity of the
police to “collect, retrieve and analyze information” by using cyber analysts

Cyber analysts have not yet been introduced in SA that makes detection of
cybercrime difficult as cyber criminals may have better software than the police

Cybercrime has an increasingly challenging policy area for government and has many
issues concerned with crime and security today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing attacks

A

Unsolicited messages from scammers that pose as “legitimate” organisations to attain personal and/or financial information from a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are three types of phishing attacks:

A
  • SYNATIC ATTACKS
    exploits technical vulnerabilities of soft- and hardware
  • SEMANTIC ATTACKS
    exploit social vulnerabilities to gain personal info
  • BLENDED ATTACKS
    combinations of syntactic and semantic attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

World Economic Forum 2019 Global risk report

A

“Technological instability” = was a highlighted risk with “massive
date fraud and theft”
ranked number 4 global risk and
cyber-attacks come in at 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The South African Banking Risk information centre

A

States that Sa has the 3rd higest number of crime victims in the world
with approximately R2.2 billion lost per year
9 million individuals being victims of cyber crime

17
Q

why cyber crime remains a threat

A

➢ Lack of investment in cybersecurity.
➢ Slow development of cybercrime legislation (POPIA, Cybercrime Act)
➢ Lack of awareness of cyber threats.
➢ Cyber attackers taking notice.

18
Q

How to reduce risks in the cyber threat landscape

A

➢ Adopt a defence-in-depth approach.
➢ Promote a security-focused cyber culture and suitable, reliable firewalls
and prevention software.
➢ Focus on compliance and create awareness programmes.
➢ Be prepared for when, not if.
➢ The challenge of managing artificial intelligence.