Professional Documents
Culture Documents
Cyber Crime: Kristel Joy D. Macose
Cyber Crime: Kristel Joy D. Macose
Crime
Kristel Joy D.
Macose
Definition
Categories
According to the Role of Computer
1. Computer as a target
Using computers as the object of the crime
2. Computer as a weapon (tool)
Using computer to commit crimes
3. Computer as an accessory (both target/tool)
Stolen Data from targeted computers
Illegal Data of crimes committed against
someone
Categories
According to Types of Cyber
Crime Victims
1. Against Person:
Cyber crimes committed against persons
2. Against Property:
Cyber crimes that are against all forms of property.
3. Against Government:
Cyber crimes committed to national/international
governments to threaten the citizens of a country.
Types
1. Hacking
Illegal
Hackeroriginally
Experts
Types
Types of Hackers:
White Hat Hackers: Good guys
Blue hat Outside computer
security consulting firms
Black Hat Hackers: Bad guys.
Only interested in personal goals
Gray Hat Somewhere in
between.
Types
2. Cyber Pornography
This would include:
Pornographic websites;
Pornographic magazines produced
using computers
Internet used to download and
transmit pornographic pictures,
photos, writings etc.
Types
3. Financial Cyber Crimes
This would include cheating, credit
card frauds, money laundering etc.
Examples:
Phishing: Receipt of unsolicited
emails from fake financial
institutions
Types
4. Cyber stalking
Online
Types
5. Denial-of-service ( DoS attack )or
distributed denial-of-service attack (
DDoS attack )
It
Types
6. Data Interference
Unauthorized
alteration, damaging,
deletion or deterioration of computer
data, document.
Types
7. Intellectual Property
Crime/Infringement
The unauthorized use, possession,
production, sale, procurement, importation,
distribution of devices, computer program.
Software Piracy: Theft of software through
the illegal copying o f genuine programs or
the counterfeiting.
Computer Piracy: Computer pirates steal
Intellectual Property.
Classification of Cyber
Criminals
1st Classification:
Computer Forensic
It is an autopsy of a computer or
network to uncover digital evidence
of a crime. The evidence must be
preserved and hold up in a court of
law.
Computer Forensic
CYBER SPACE
CRIMINALS
Deleting their files and
emails
Hiding their files by
encryption, password
protection, or
embedding them in
unrelated files (dll, os
etc)
Using Wi-Fi networks
and cyber cafes to
cover their tracks
FORENSICS