Professional Documents
Culture Documents
TYPES
Cybercrime
A cybercrime is a crime committed with or
through the use of information and
communication technologies such as
radio, television, cellular phone, computer
and network, and other communication
device or application.
IDENTITY THEFT
knowingly transfers, possesses, or uses,
without lawful authority, a means of
identification of another person with the
intent to commit, or to aid or abet, or in
connection with, any unlawful activity that
constitutes a violation of law, or that
constitutes a felony under any applicable
law
IDENTITY THEFT
identity theft may make possible crimes
such as bank fraud, document fraud, or
immigration fraud, and it may be aided by
crimes such as theft in the form of robbery
or burglary
CYBERBULLYING
Cyberbullying involves the use of
information and communication
technologies such as e-mail, cell
phone and pager text messages,
instant messaging (IM),
defamatory personal Web sites,
and defamatory online personal
polling Web sites, to support
deliberate, repeated, and hostile
behaviour by an individual or
group, that is intended to harm
others.
ONLINE HARASSMENT
It refers to the use of the Internet, e-mail or
other electronic devices to pursue another
person. It involves sending unwanted,
abusive, threatening or obscene e-mails.
Another means involves electronic sabotage
or spamming where the victim is sent
hundreds of junk e-mail messages. A variant
of spamming involves the sending of
computer viruses to the victim. The third
common form arises in live Internet relay chat
sessions, message boards or news groups or
by way of instant messaging.
CYBERSTALKING
Cyberstalking may arise where an
individual pursues or repeatedly attempts
to contact someone via the Internet. The
Internet provides a number of protocols
by way of which this may happen, such
as e-mail, chat rooms, instant
messaging, bulletin boards, website
discussion forums or user net groups.
The distinction between harassment and
cyberstalking is that cyberstalking is
characterised by pursuit and fear.
SEXUAL PREDATION
Online molesters use the Internet
venues popular with children and
adolescents to lure children into sexual
assaults.
They use information publicly divulged
in online profiles and social networking
sites to identify potential targets.
They contact victims, using deception
to cover up their ages and sexual
intentions.
Then they entice unknowing victims
into meetings or stalk and abduct them
SEXUAL PREDATION
A sex offender who commit a sexually violent
offence online e.g., rape, criminal sexual act,
forcible compulsion, insertion of foreign object or
fingers in anal or urogenital regionsand who
suffers from a mental abnormality or personality
disorder that makes him or her likely to engage
in predatory sexually violent offences.
PHISHING
Phishing is a form of social engineering in which an attacker,
also known as a phisher, attempts to fraudulently retrieve
legitimate users confidential or sensitive credentials by
mimicking electronic communications from a trustworthy or
public organization in an automated fashion.
The word phishing appeared around 1995, when Internet
scammers were using email lures to fish for passwords and
financial information from the sea of Internet users; ph is a
common hacker replacement of f, which comes from the
original form of hacking, phreaking on telephone switches
during 1960s.
PHISHING
A complete phishing attack involves three roles of phishers.
Firstly, mailers send out a large number of fraudulent
emails (usually through botnets), which direct users to
fraudulent websites.
Secondly, collectors set up fraudulent websites (usually
hosted on compromised machines), which actively prompt
users to provide confidential information.
Finally, cashers use the confidential information to achieve
a pay-out. Monetary exchanges often occur between those
phishers.
TYPES OF PHISHING
Clone Phishing
In this type phisher creates a cloned email. He
does this by getting information such as content
and recipient addresses from a legitimate email
which was delivered previously, then he sends the
same email with links replaced by malicious ones.
He also employs address spoofing so that the
email appears to be from the original sender. The
email can claim to be a re-send of the original or
an updated version as a trapping strategy
TYPES OF PHISHING
Spear Phishing
Spear phishing targets at a specific group. So
instead of casting out thousands of emails
randomly, spear phishers target selected groups
of people with something in common, for
example people from the same organization.
TYPES OF PHISHING
Phone Phishing
This type of phishing refers to messages that claim to be
from a bank asking users to dial a phone number regarding
problems with their bank accounts. Traditional phone
equipment has dedicated lines, so Voice over IP, being easy
to manipulate, becomes a good choice for the phisher. Once
the phone number, owned by the phisher and provided by a
VoIP service, is dialed, voice prompts tell the caller to enter
her account numbers and PIN. Caller ID spoofing, which is
not prohibited by law, can be used along with this so that the
call appears to be from a trusted source.