Professional Documents
Culture Documents
Cybercrime is a growing, global problem. Whether you are a small business, a fortune
500 company, buying your first smartphone or becoming a cyber-security expert, you need to be
aware of cybercrime. The Internet affords education and economic opportunities beyond
anything the world has ever seen. This same tool, however, also allows for unprecedented
opportunities to cause harm. By abusing technology, cybercriminals ruin businesses and even
lives. Many countries and organizations around the world are fighting to stop cybercriminals and
help to make systems more secure.
Furthermore, there is no universally accepted definition of cybercrime. However,
the following definition includes elements common to existing cybercrime definitions.
Cybercrime is an act that violates the law, which is perpetrated using information and
communication technology (ICT) to either target networks, systems, data, websites
and/or technology or facilitate a crime (e.g., Goodman, and Brenner, 2002; Wall, 2007;
Wilson, 2008; ITU, 2012; Maras, 2014; Maras, 2016). Cybercrime differs from traditional
crime in that it "knows no physical or geographic boundaries" and can be conducted
with less effort, greater ease, and at greater speed than traditional crime (although this
depends on the type of cybercrime and type of crime it is being compared to) (Maras,
2014; for information about different types of cybercrime.
Cybercriminals often use both technical and social approaches to commit crime.
Some types of cybercrime are difficult to prevent, however, technology users can take
certain actions to protect themselves (to an extent) from cybercrime.
Europol (2018) provides numerous public awareness and prevention guides on website.
However, even small actions can make a big difference. Below are some tips to
consider when accessing the Internet.
Keep your operating system and installed software up-to-date
Regularly uninstall software that you no longer use
Use an anti-virus program from a reputable company
Do not download software, movies or music from sharing sites - these very often
have malware
Do not download attachments or click on links from senders you do not recognize
Do not enter personal information in unknown websites
Confirm the correct website when entering financial information
A further tactic used to gain unauthorized access to the target is a watering hole
attack, which is "an attack whereby a cybercriminal monitors and determines the
websites most frequented by members of particular organization or group and infects
those sites with malware in an attempt to gain access to its networks" (Maras, 2016, p.
382). For instance, the modification of the "Thought of the Day" widget on the Forbes
website, a US financial information and news magazine, made a watering hole attack
targeting common users of the site, particularly individuals in finance and defence,
possible (Peterson, 2012; Rashid, 2012).
Furthermore, insiders, those who are already part of the organization, company, or
agency the perpetrators want to gain access to, are also utilized to conduct or facilitate
cyberespionage. These individuals can intentionally or unintentionally disclose
confidential or sensitive information to countries or others linked in some way to foreign
countries as part of their intelligence collection efforts (CERT Insider Threat Center,
2016).
Cyberespionage has been made possible by the numerous hacking tools that are
widely available online. These tools include exploits (e.g., zero day - that is, previously
unknown vulnerabilities exploited once identified - or those that can penetrate systems
and bypass firewalls) and implants (e.g. backdoor, secret portal used to gain
unauthorized access to systems, or a remote access tool or RAT).
Some countries have laws that criminalize the distribution of false information
that could influence voter behaviour and election results, and other forms of electoral
fraud (e.g., France, the United Kingdom, and various states in the United States)
(Daniels, 2010; Alouane, 2018). Other countries that have laws that criminalize false
information and fake news have used these laws to prosecute journalists and other
individuals who criticize or otherwise challenge the government (Reuters, 2018;
Gathright, 2018; Priday, 2018). Despite these regulations, many political groups and
actors continue to push the envelope in attempts to manipulate public opinions, often
taking advantage of loopholes or omissions in the legislation. Moreover, politically
motivated groups have developed mechanisms to influence public opinion by exploiting
the features of various websites, such as the "like," "heart," or "upvote" functions of
social media services, with the intent of popularizing certain ideologically-loaded news
items. These actions, often referred to as "astroturfing" (Zhang, Carpenter, and Ko,
2013, p. 3), do not necessarily entail publishing misleading or libelous information but
rather focus on manipulating the newsfeed of users (Popham, 2018).
ections.
Based on the inoculation theory, a solution to misinformation (i.e., false or
inaccurate information) and disinformation (i.e., purposely false or inaccurate
information) has been proposed. This solution seeks to inoculate individuals against
misinformation and disinformation by providing them with the means to build resistance
to messaging and propaganda, reducing their susceptibility to misinformation and
disinformation, and leading them to question the veracity of the information being
presented to them as well as the legitimacy of the source presenting the information.
Misinformation and disinformation can thus be countered with education, not just in
regards to the topics being communicated, but also education about the tactics and
methods used to create and spread misinformation and disinformation.
Other ways of countering misinformation, disinformation, and fake news: (1) fact
checking by independent parties and (2) limiting the propagation of fake news,
disinformation, and misinformation based on an online platform's community rules.