Professional Documents
Culture Documents
Cyber Crime
Cyber Crime
(Legal term) As in traditional crimes, for a cybercrime to exist four elements must be
present: actus reus (the prohibited act or failing to act when one is supposed to be under
duty to do so);
mens rea (a culpable mental state); attendant circumstances (the existence of certain
necessary conditions); and harm resulting to persons or property.
3. Differentiate cybercrime from computer crime.
4. What is stalking?
Cyberstalking refers to the use of the internet and other technologies to harass or stalk
another person online, and is potentially a crime. This online harassment, which is an
extension of cyberbullying and in-person stalking, can take the form of e-mails, text
messages, social media posts, and more and is often methodical, deliberate, and persistent.
9. Categories of cybercrime
Phishing is one of the main forms of social engineering attacks, and as any social
engineering attack it tries to trick unsuspecting users into giving away personal
information.
Internet Fraud The victim will be asked to cover a small portion of the cost of moving
the money or asset, and will be promised a bigger cut of the benefits when the process
is over. If the victim falls for it and transfers money, he or she will be told that
complications have arisen and that more money will be required. Of course, the victim
will not recover anything and this will go on until the scammer feels like there’s nothing
to gain from this victim and jump to another one.
Intellectual property infringements vary from the sale of counterfeit or replica goods,
content piracy, patent infringement and more. In the following article you can find a full
list of every intellectual property infringement type.
Counterfeit and replica goods: Product created to look identical to an existing
product made by a third party’s brand; while counterfeits are branded, replicas
are not.
Piracy: Piracy is the unauthorized reproduction, copying and spreading of
copyrighted materials.
Patent infringement: These are products which exactly copy the functionality
and mechanism of products protected by utility patents.
Identity theft is closely related to the phishing scams that were discussed earlier. As
another computer as a tool cybercrime, they existed much earlier than the Internet did,
but it has certainly improved their reach and ease of execution.
Online harassment and cyberbullying is usually contained within social media in the
form of posts, comments or direct messages; but it could also be sent through email.
These messages’ main form is mostly defamatory or threatening either against one
individual or group.
10. Explain the word fishing
Phishing is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening an email, instant message, or text message.
11. Differentiate online harassment from cyberstalking.
Harassment is an action which is intended to harass, annoy, alarm, abuse, torment, or
embarrass another person. Specifically, a person can be charged with harassment if they
have the intent to annoy, torment or harass another person
While harassment typically involves threatening or annoying communications, stalking
charges can be filed for actions that involve making direct, credible threats that place
another person in fear of bodily injury or death.