Professional Documents
Culture Documents
Submitted by:
Rovelyn S. Credo
Submitted to:
- Cybercrime is any crime that takes place online or primarily online, in which an
activity done using computers and internet. It may threaten a person’s security and
financial health.
- The two elements of Computer Crime are COMPUTER and CRIME, involves the
direct usage of a computer by the criminal as one of the first famous computer
criminals did. However, it can also be indirect, criminal also use a computer to commit
a crime.
- Cybercrime involves the use of the internet or cyberspace which is an internet crime
along with a computer, while Computer crimes account for criminal acts that are
committed via the use of computer.
THEFT- it is when any person uses a computer or network with knowledge that such
use is without authority and with the intention of either taking property of another.
SALAMI ATTACKS- a way of an attacker steals the money in small amounts of funds
from multiple bank accounts.
TROJAN ATTACKS- it is a way of an attacker to try and gain user’s system access
with their software.
WEB JACKING- it is a way of an attackers in social media where the creator makes a
fake website and when the website open it will direct it to another malicious website
then it harms the user’s system.
CYBER TERRORISM- with the use of an internet, attackers conduct violent acts that
result in, or threaten, the loss of life or significant bodily harm, in order to achieve
political or ideological gains through threat or intimidation.
- Cyber Security controls to protect systems, networks, programs, devices and data from
cyber-attacks. However, it aims to reduce the risk of cyber-attacks and protect against the
unauthorized exploitation of systems, networks, and technologies.
REJECTED STALKER- they are primarily ex-partners, however, can extend to other
groups whereby there has been a loss of a deeply significant, intimate relationship.
RESENTFUL STALKER- they all had contact with the victim or their work at some
point to initiate their obsession and resentfulness, which they fit into the stranger.
PREDATORY STALKER- they are incredibly rare and considered highly dangerous
due to their deviant desires, at some point, they are obsessed by deviant sexual
desires and unusual practices.
1. The computer as a target- which the offender uses the computer to obtain
information or to damage operating programs.