Professional Documents
Culture Documents
From?
An assault on an IT asset, network, intellectual
property, or any other type of sensitive data may
also be classified as a "cyber-threat" which
describes the potential of an attack to take place.
Cyber threats may come from within an
organization's network as well as from unidentified
parties in other countries.
Numerous actors pose a danger to the internet, including the following:
• Hostile Nation-States
• Terrorist Groups
• Corporate Spies and Organized Crime Organizations
• Hacktivists
• Disgruntled Insiders
• Hackers
• Natural Disasters
• Accidental Actions of Authorized Users
Cyber Squatting
• To register and use domain names that resemble trademarks
and service marks without authorization from the trademark
owners is a criminal offence
• Squatting on another's trademark in bad faith is known as
"cybersquatting," and it involves registering, trading, or
otherwise making use of an Internet domain name that belongs
to the trademark owner.
• "Squatting" is the act of occupying an unoccupied location or
building without permission, according to Wikipedia.
Cyber Warfare
The Dark Web Any area of the internet (websites, e-stores, forums, etc.)
that cannot be found by a standard search engine like Google or Bing is
known as the "deep web." The dark web, or "darknet," is a subset of the deep
web that can only be accessed via a specialized browser such as Tor. The
anonymity provided by the dark web makes it a haven for criminals, even if it
is not unlawful in and of itself
Classification of Cyber-Crimes
Email Spoofing
Due to the architecture of email systems, spoofing is feasible. Email servers can't detect whether a
sender address is authentic or faked since it's issued by a client application. Email spoofing attempts
to fool recipients into thinking the email is coming from someone they know or trust, usually a
coworker, vendor, or well-known company. The attacker takes advantage of the recipient's
confidence and begs for information or some other action. Click here for details
Email Spam
SEO Spam
Content Spam
Link Spam
Mobile Spam
Messaging Spam
Cyber Defamation
Whereas
Data diddling is a kind of computer fraud that involves intentionally altering the
numbers entered into a database. When filing tax forms or other financial records,
its common practice to inflate or understate revenue or expenditures in order to
gain an advantage for the firm or person concerned.
When it comes to fraud, data diddling is unique in that it only pertains to the
falsification of data at the time of input.
Espionage
In the hacking world, hackers are known as the "bad guys" because of their actions
The "good people" in the hacker community, white hats are those who actively work to thwart
the gains of the bad guys. Known as "ethical hackers" they use their specialized skills to gain
access to networks in order to assess their level of security. Security weaknesses can be
discovered and patched before black hat hackers can take use of them.
Computer Sabotage
Online Frauds
"online fraud" refers to fraudulent actions like identity theft and financial scams that
are carried out via the use of the internet.
Tips to Avoid Online Frauds
1. Use up-to-date versions of security software, web browsers, and
operating systems.
2. Use a strong password
3. Never open attachments or pop-up windows from sources you don't
trust.
4. Avoid publishing personal information
5. Use a password to secure your home's wireless network
6. Use a secure online shopping website
7. Check the privacy rules of the website before giving away any
personal information.
E-Mail bombing
1. Mass mailing
2. List linking
3. ZIP bombing
4. Reply all
5. Attachment
How do you defend against mail bombs?
Computer Network intrusion
• Skimming: On the credit card swipe machine, the skimmer is retained by the
swindlers to steal customer data. Whenever you use your credit card to make a
purchase, this gadget will record that information.
• Dumpster diving: Thieves may steal your credit card information if you throw away
your bills or other papers that include your entire credit card number.
• Hacking: Customers' credit card information may be stolen from businesses you've
transacted with or from organizations that handle credit card payments. As a result,
they'll commit hacking crimes.
• Phishing: In phishing, people are tricked into divulging their personal information to
fraudsters who then use that information against them.
Identify Theft
The fraudulent use of another person's identity is called
identity theft.