You are on page 1of 7

“Cyber crimes”

English Computer Science


“Cyber Crime”
Cyber crime - Computer crime refers to crimes involving
computers and computer networks. "Crime committed
against individuals and groups of individuals with criminal
intent to damage the reputation of the victims or cause
physical or mental harm directly or indirectly, using the
Internet" (Dr. Halder and Dr. Jaishankar)

Often, when examining online deviance, the term cybercrime


is used. Cybercrime refers to illegal activities that occur in the
virtual world of the Internet, and this can also be taken as a
definition for computer crimes. Another definition can be:
computer crime is a criminal offense that was created with the
creation of technology, or can it be considered a traditional
crime transformed into a computer crime
"How to Protect Yourself from Cyber ​
Attacks"
An online "theft" attempt happens every 39 Keep your software up to date. A computer
seconds worldwide. that does not receive its system updates is
more exposed to failures, security and cyber
attacks than a computer that receives updates
The estimated damage from online hacking or regularly. Hackers are constantly scanning for
theft for 2019 reaches the figure of 2 trillion security weaknesses in systems and networks,
and if you keep those weaknesses for too long
dollars.
without fixing them, you increase your
chances of falling victim to a cyber attack.
In 2018 alone, in the dark cyber world, hackers
Educate employees. Make sure your company's
have profited more than half a billion dollars
employees are aware of the ways
from the sale of stolen information. cybercriminals can infiltrate your system.

Antivirus software is the most common and will


protect against most types of attacks.
“Evil corp”
Evil Corp is an international cybercrime
network that uses malicious software to Law enforcement has pursued
steal money from victims' bank accounts Evil Corp for years with limited
and launch ransomware attacks. In the success. Although the US
last decade, Evil Corp has stolen more government sanctioned 17
than $100 million from hundreds of members of the group and
banks around the world. Many consider indicted its leaders in December
Evil Corp to be the largest, most 2019, no arrests have followed
damaging hacker group in the world and the group remains active as
of this writing. The Department
of Justice has reported that
attacks related to Evil Corp are
still occurring.
“Cyber Crimes in Kosovo”
The World Bank through (GCSCC 2016) is helping
Kosovo to strengthen cyber security through a
capacity building assessment pilot project aimed at
identifying cyber gaps in the country. the attacks are mainly coming
from Iran. The group that has
taken responsibility for these
Most of the data in Kosovo is managed by the attacks is the Anon Atreus
Information Society Agency (ASHI) and a group, which many indications
successful attack on this institution would have the link to the state of Iran. A
greatest impact on data exposure, since ASHI's logical conclusion is that these
servers store most of the data. of citizens and the attacks are a continuation of
data used by the government for operation. what is happening in Albania.
“Ransomware”
Any computer can be infected with ransomware,
however, the main target of ransomware creators
is the personal computer.
Ransomware infection can occur in different
Ransomware is the most dangerous
methods. Installing applications from unofficial
type of virus on the internet. websites can even happen if someone's
Ransomware was created in the computer is infected on the Internet where we are
1980s so that people who get connected.
infected with it have to pay to
access the infected document. When Ransomware enters our computer, the
virus encrypts all the documents on the computer,
blocking access to the documents. To return the
documents to the previous version, before the
infection, a certain amount of cryptocurrency is
required to be paid.
“Weaknesses/violations in cyber security”
● - In cyber space (cyber domain)
there is no complete security and
• Most cyber-attacks are caused by human
protection. However,
error, so "insider threats" are real.

● the possibility of a cyber attack is


• Critical MoD/FA information
many times greater than that of a
infrastructures are increasingly subject to
physical attack.
attacks

● - Both in the territory of our


• complex cybernetics. Such attacks are
country and abroad in missions,
undertaken specifically against a
defense personnel (MoD/FA)
particular target. Due to the limited direct
impact of cyber attacks, the risk
associated with them

You might also like