You are on page 1of 32

WHAT IS CYBERCRIME?

Instant Messaging Online Gaming Social


and Chat with messaging Networkin
g
 It was noted that 63% of Filipinos, or
around 67 million of the total Philippine
population of 105.7 million, have access to
the internet.

 The number of internet users increased by


seven million in the past year.

 Almost all Filipino internet users are


using social media accounts such as
Facebook, TiktokTwitter and Instagram.

Source : https://www.philstar.com/headlines/2018/02/03/1784052/philippines-still-worlds-
social-media-capital-study
Perpetrators: Cybercrime involves individuals or groups who
commit illegal activities using computer networks and the
internet. Perpetrators can vary from lone hackers to organized
criminal syndicates and state-sponsored actors.

Targets: Cybercriminals target a wide range of entities, including


individuals, businesses, governments, critical infrastructure, and
other organizations vulnerable to digital attacks.
Types of Cybercrime

Cybercrime encompasses various forms of illegal activities, such


as:

 Hacking
 Phishing
 Malware Attacks
 Identity Theft
 Cyber Espionage
Motivations

Cybercriminals are driven by various motives, including:

•Financial Gain

•Ideological Reasons

•Political Aims

•Hackers' Challenge
Tools and Techniques

Cybercriminals utilize a range of tools and techniques to execute their


attacks, including:

Malware
Social Engineering
Investigating Cybercrime
OVERVIEW ON HOW CYBERCRIME IS INVESTIGATED:

1. Incident Detection and Reporting


2. First Responders
3. Preservation of Evidence
4. Digital Forensics
5. Trace back and Attribution
6. Collaborating with ISPs and Tech Companies
OVERVIEW ON HOW CYBERCRIME IS INVESTIGATED:

7. Coordinating with Law Enforcement


8. Gathering Witness Testimonies
9. Data Analysis
10. Building a Case
11. Legal Proceedings
12. Follow-up and Remediation
REFERENCES
 Akdeniz, Y., & Walker, C. (Eds.). (2016). The Routledge Handbook of Cybercrime and Cybersecurity.
Routledge.
 Brenner, S. W. (2019). Cybercrime and the Law: Challenges, Issues, and Outcomes. Oxford University Press.
 Goodman, M., & Brenner, S. W. (Eds.). (2012). Cybercrime: Criminal Threats from Cyberspace. ABC-CLIO.
 Grabosky, P. N., Smith, R. G., & Dempsey, G. (Eds.). (2015). Cybercrime and Security. Routledge.
 McAfee. (2020). McAfee Labs Threats Report: November 2020. McAfee, LLC. [Online]. Available:
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-nov-2020.pd
 Moore, R., & Clayton, R. (2015). The Impact of DDoS and Other Security Shocks. In J. Moore & G. D. M.
Serong (Eds.), Economics of Information Security and Privacy (pp. 201-244). Springer.
END OF PRESENTATION

You might also like