You are on page 1of 15

Cyber

Crime

Kristel Joy D.
Macose

Definition

It is an unlawful act done using


computers and network wherein
the computer is either
1. a tool,
2. a target, or
3. both.

Categories
According to the Role of Computer
1. Computer as a target
Using computers as the object of the crime
2. Computer as a weapon (tool)
Using computer to commit crimes
3. Computer as an accessory (both target/tool)
Stolen Data from targeted computers
Illegal Data of crimes committed against
someone

Categories
According to Types of Cyber
Crime Victims
1. Against Person:
Cyber crimes committed against persons
2. Against Property:
Cyber crimes that are against all forms of property.
3. Against Government:
Cyber crimes committed to national/international
governments to threaten the citizens of a country.

Types
1. Hacking
Illegal

intrusion into a computer system and/or


network.

Hackeroriginally

referred to a person with a


very high level of computer expertise but now
the term usually describes a person who gains
access to computer systems illegally.

Experts

prefer the termcrackerfor persons


engaging in illegal activities.

Types
Types of Hackers:
White Hat Hackers: Good guys
Blue hat Outside computer
security consulting firms
Black Hat Hackers: Bad guys.
Only interested in personal goals
Gray Hat Somewhere in
between.

Types
2. Cyber Pornography
This would include:
Pornographic websites;
Pornographic magazines produced
using computers
Internet used to download and
transmit pornographic pictures,
photos, writings etc.

Types
3. Financial Cyber Crimes
This would include cheating, credit
card frauds, money laundering etc.
Examples:
Phishing: Receipt of unsolicited
emails from fake financial
institutions

Types
4. Cyber stalking
Online

harassment and online abuse.


Obtaining information of the victim
order to threaten or frighten the
victim.

Types
5. Denial-of-service ( DoS attack )or
distributed denial-of-service attack (
DDoS attack )
It

is an attempt to make a machine


or network resource unavailable to
its intended users.

Types
6. Data Interference
Unauthorized

alteration, damaging,
deletion or deterioration of computer
data, document.

Types
7. Intellectual Property
Crime/Infringement
The unauthorized use, possession,
production, sale, procurement, importation,
distribution of devices, computer program.
Software Piracy: Theft of software through
the illegal copying o f genuine programs or
the counterfeiting.
Computer Piracy: Computer pirates steal
Intellectual Property.

Classification of Cyber
Criminals
1st Classification:

Computer Forensic
It is an autopsy of a computer or
network to uncover digital evidence
of a crime. The evidence must be
preserved and hold up in a court of
law.

Computer Forensic
CYBER SPACE
CRIMINALS
Deleting their files and
emails
Hiding their files by
encryption, password
protection, or
embedding them in
unrelated files (dll, os
etc)
Using Wi-Fi networks
and cyber cafes to
cover their tracks

FORENSICS

Restoring deleted files


and emails they are still
really there.
Finding the hidden files
through complex
password, encryption
programs, and searching
techniques.
Tracking them down
through the digital trail IP addresses to ISPs to
the offender.

You might also like