You are on page 1of 7

MINISTRY OF EDUCATION AND SCIENCE OF UKRAINE

STATE UNIVERSITY OF TELECOMMUNICATIONS


DEPARTMENT OF INFORMATION AND CYBER ​SECURITY

REPORT ON THE TOPIC:


“WAYS OF COMBATING COMPUTER
CRIME”
Completed: student groups BSD - 34
Cherneha S. O.
Gmail: rhinemoow@gmail.com

Kyiv 2020
INTRODUCTION
Cybercrime is a significant challenge to society, but it can be
particularly harmful to the individuals who become victims.
On this report engages in a comprehensive and topical
analysis of the cybercrimes that target individuals. It also
examines the motivation of criminals that perpetrate such
attacks and the key human factors and psychological aspects
that help to make cybercriminals successful.

Number of unauthorized transactions


TYPES OF CYBERCRIME
At its core, there are arguably three types of cybercrime:
• crimes in the device;
• crimes using the device;
• and crimes against the device.
SOCIAL ENGINEERING AND ONLINE TRICKERY

Trickery, deceit, and scams are examples of some of the oldest means used by
adversaries to achieve their goals.
PHISHING AND ITS VARIANTS

Phishing is a specific type of social engineering crime that occurs using


electronic communications, such as an email or a website. In it, criminals send
an email, or create a website, that appears to be from a legitimate entity with
the intention of conning individuals into divulging some sensitive information
or performing a particular action.
ONLINE SCAMS

In addition to phishing, online scams are also worth mentioning. Scams also
involve trickery and deceit and typically have financial gain as the prime
motive.
COMBATING COMPUTER CRIME
It is difficult to find and combat cyber
crime's perpetrators due to their use of the
internet in support of cross-border attacks.
Not only does the internet allow people to
be targeted from various locations, but the
scale of the harm done can be magnified.
Cyber criminals can target more than one
person at a time. The availability of virtual
spaces to public and private sectors has
allowed cybercrime to become an
everyday occurrence.
When considering the problems of data protection in the network, first of all,
the question arises about the classification of failures and access violations that
can lead to the destruction or unwanted modification of data. Potential threats
are shown in the figure.
THANKS FOR YOUR
ATTENTION!

You might also like