You are on page 1of 29

CYBER CRIMES

Ivy Rose B. Recierdo


BSED I - A
What is Cybercrime?
 Refers to all the activities done with criminal
intent in cyberspace.
 Refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
History
 The first
recorded
cybercrime took
place in the year
1820.
 When computers and networks came
into being in the 1990s, hacking was
done basically to get more
information about the systems.
 As hackers became more skilful, they
started using their knowledge and
expertise to gain benefit by exploiting
and victimizing others.
Causes of Cybercrime
 Accessing sensitive information and
data and using it means a rich
harvest of returns Hence, this has
led to a rise in cyber crime across the
world.
Classification of Computer
Crimes
 Fraud and financial crimes
 Cyber terrorism

 Cyber extortion

 Cyber warfare
Fraud and Financial
Crimes
 Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss. Result in
obtaining a benefit by:
Altering in an unauthorized way.
Altering,destroying, suppressing, or
stealing output, usually to conceal
unauthorized transactions.
Altering or deleting stored data
Cyber Terrorism
 Cyber Terrorism in general, can be
defined as an act of terrorism
committed through the use of
cyberspace or computer resources.
 A cyber terrorist is someone who
intimidates or coerces a government
or organization to advance his or her
political or social objectives by
launching a computer-based attack
against computers, networks, or the
information stored on them.
Cyber Extortion
 Cyber extortion occurs when a
website, e-mail server, or computer
system is subjected to or threatened
with repeated denial of service or
other attacks by malicious hackers.
 Hackers demand money in return for

promising to stop the attacks and to


offer "protection.”
Categorization of Cyber
Crime
 Individual
 Property

 Government
Types of Computer
Crimes
Hacking
 Hacking in
simple terms
means an illegal
intrusion into a
computer
system and/or
network.
Denial of Service (DoS)
Attack
 Act by the criminal, who
floods the bandwidth of the
victim’s network.
 In his e-mail box with spam

mail depriving him of the


services.
Cyber Stalking

 This is a kind of online harassment


wherein the victim is subjected to a
barrage of online messages and
emails. Typically, these stalkers know
their victims and instead of resorting
to offline stalking, they use the
Internet to stalk to make the victims’
lives more miserable.
Identity Theft
 In this cyber crime, a criminal
accesses data about a person’s bank
account, credit cards, Social Security,
debit card and other sensitive
information to steal money or to buy
things online in the victim’s name. It
can result in major financial losses for
the victim and even spoil the victim’s
credit history.
Malicious Software
 These are Internet-based software or
programs that are used to disrupt a
network. The software is used to gain
access to a system to steal sensitive
information or data or causing
damage to software present in the
system.
Child soliciting and Abuse
 This is also a type of cyber crime
wherein criminals solicit minors via
chat rooms for the purpose of child
pornography.
Computer Vandalism
 Damaging or destroying data rather
than stealing.
 Transmitting Virus

Cyber Terrorism
 Use of Internet base attacks in
terrorist activities.
Software Piracy
 Theft of software through the illegal
copying of genuine programs.
 Distribution of products intended to
pass for the original.
Virus Dissemination
 Malicious
software that
attaches itself
to other
software. (virus,
worms, Trojan
Horse, web
jacking, e-mail
bombing, etc.)
Categories Of Computer
Viruses
Categories of Computer
Viruses
 Boot Sector Viruses – infects the
boot record of a hard or floppy disk.
 Cluster Viruses – this type of virus
make changes to a disk’s file system.
 File-Infecting Viruses – this type of
virus infects program files on a disk
(such a EXE or COM files).
Categories of Computer
Viruses
 Worms – a worm is a program
whose purpose is to duplicate itself. It
is commonly spread over the Internet
via e-mail message attachments and
Internet Relay Chat (ICR).
 Bombs – this type of virus hides on

the user’s disk and waits for a


specific event to occur before
running.
Categories of Computer Viruses

 Trojan Horses – is a malicious


program that appears to be friendly,
they are not technically viruses. But,
because they can do harm, they are
considered viruses.
 Stealth Viruses – these viruses take

up residence in the computer’s


memory, making them hard to detect.
Categories of Computer
Viruses
 Polymorphic, Self-Garbling, Self-
Encrypting, or Self-Changing
Viruses – this type of virus can
change itself each time it is copied,
making it difficult to isolate.
 Macro Viruses – a virus designed to

infect a specific type of document file,


such as Microsoft Word or Excel files.

You might also like