Professional Documents
Culture Documents
of
Cybercri
mes
The earliest
computers were
invented by the
Chinese over 800
years ago
Abacuses
- were unsophisticated
instruments designed
exclusively for
mathematical
computations.
As stressed by McQuade (2009), cybercrime
has come about and evolved with the
Internet and other advances in IT. 1.
Computer-related crime- illegal behaviors in
which one or more computers were helpful
but not necessary to commit a criminal act.
(VSD) –are the lowest life form of cybercriminal. The term is derogatory one
capable of writing their own programs and do not fully understand the
programs which they are executing. Thus, they are not capable of targeting a
specific system, but are limited to those targets which possess the identified
a. Revenge
b. Opportunity
c. Greed
d. Test of Skill
e. Business Competitor
f. Professional Criminal
g. Terrorism
h. Geopolitics
Toolkit of Cybercriminals:
a. Backdoor
b. Trojan horses
c. Virus
d. Computer Worm
e. Bundlers
h. Spyware
Toolkit of Cybercriminals:
2. Phishing:
a. Spoofing
b. Pharming
c. Redirectors
e. Floating windows