Professional Documents
Culture Documents
Types of Cybercrime
Types of Cybercrime
individuals who become victims. On this report engages in a comprehensive and topical
analysis of the cybercrimes that target individuals. It also examines the motivation of
criminals that perpetrate such attacks and the key human factors and psychological aspects
that help to make cybercriminals successful.
Types of Cybercrime
At its core, there are arguably three types of cybercrime: crimes in the device, crimes using
the device, and crimes against the device. Crimes in the device relates to situations in which
the content on the device may be illegal or otherwise prohibited. Examples include trading
and distribution of content that promotes hate crimes or incites violence. The next category,
crimes using the device, encompasses crimes where digital systems are used to engage and
often, to deceive, victims. An example of this is a criminal pretending to be a legitimate
person (or entity) and tricking an individual into releasing their personal details (e.g.,
account credentials) or transferring funds to other accounts.
It is difficult to find and combat cyber crime's perpetrators due to their use of the
internet in support of cross-border attacks. Not only does the internet allow people to be
targeted from various locations, but the scale of the harm done can be magnified. Cyber
criminals can target more than one person at a time. The availability of virtual spaces to
public and private sectors has allowed cybercrime to become an everyday occurrence.
Слайд 6
The problem of protecting information from unauthorized access has become especially
acute with the widespread use of local and, especially, global computer networks. It should
also be noted that often the damage is caused not because of "malicious intent", but because
of elementary user errors that accidentally spoil or delete vital data. In this regard, in addition
to access control, a necessary element of information protection in computer networks is the
differentiation of user rights.