You are on page 1of 1

Cybercrime is a significant challenge to society, but it can be particularly harmful to the

individuals who become victims. On this report engages in a comprehensive and topical
analysis of the cybercrimes that target individuals. It also examines the motivation of
criminals that perpetrate such attacks and the key human factors and psychological aspects
that help to make cybercriminals successful.

Types of Cybercrime

At its core, there are arguably three types of cybercrime: crimes in the device, crimes using
the device, and crimes against the device. Crimes in the device relates to situations in which
the content on the device may be illegal or otherwise prohibited. Examples include trading
and distribution of content that promotes hate crimes or incites violence. The next category,
crimes using the device, encompasses crimes where digital systems are used to engage and
often, to deceive, victims. An example of this is a criminal pretending to be a legitimate
person (or entity) and tricking an individual into releasing their personal details (e.g.,
account credentials) or transferring funds to other accounts.

Combating Computer Crimes

It is difficult to find and combat cyber crime's perpetrators due to their use of the
internet in support of cross-border attacks. Not only does the internet allow people to be
targeted from various locations, but the scale of the harm done can be magnified. Cyber
criminals can target more than one person at a time. The availability of virtual spaces to
public and private sectors has allowed cybercrime to become an everyday occurrence.

Слайд 6

The problem of protecting information from unauthorized access has become especially
acute with the widespread use of local and, especially, global computer networks. It should
also be noted that often the damage is caused not because of "malicious intent", but because
of elementary user errors that accidentally spoil or delete vital data. In this regard, in addition
to access control, a necessary element of information protection in computer networks is the
differentiation of user rights.

You might also like