What is cybercrime?
Introduction of Cybercrime.
Nowadays, all digital devices (including computers, tablets, and smartphones) are connected to the internet. In theory, cybercriminals could bring a large part of the Netherlands to a halt. The government rightly takes cybercrime very seriously, and we are working hard to fight it.
Cybercrime is that the activity of using computers and networks to perform illegal activities like spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrime hacks are committed through the web, and a few cybercrimes are performed using Mobile phones via SMS and online chatting applications.
Common forms of cybercrime
Common forms of cybercrime include:
- Phishing: using fake email messages to get personal information from internet users;
- misusing personal information (identity theft);
- Hacking: shutting down or misusing websites or computer networks;
- spreading hate and inciting terrorism;
- distributing child pornography;
- grooming: making sexual advances to minors.
Type of Cybercrime
- The following list presents the common sorts of cybercrimes:
- Computer Fraud: Intentional deception for private gain via the utilization of computer systems.
- Privacy violation: Exposing personal information like email addresses, phone numbers, account details, etc. on social media, hacking websites, etc.
- Identity Theft: Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information: This involves distributing copyright-protected files like eBooks and computer programs etc. - Electronic funds transfer: This involves gaining unauthorized access to bank computer networks and making illegal fund transfers.
- Electronic money laundering: This involves the utilization of the pc to launder money.
- ATM Fraud: This involves intercepting ATM card details like account number and PINs. These details are then wont to withdraw funds from the intercepted accounts.
- Denial of Service Attacks: This involves the utilization of computers in multiple locations to attack servers with a view of shutting them down.
- Spam: Sending unauthorized emails. These emails usually contain advertisements.
- Carding: bypass payment gateway
Computer Security
The security applied to computing devices such as computers and smartphones, as well as computer
networks such as private and public networks, including the whole Internet, is called Computer
Security.
It includes physical security to prevent theft of equipment and information security to protect the data
on that equipment. It is sometimes referred to as “Cyber Security” or “IT security”.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and
availability of data.
Computer Threats
A threat is a possible danger that might exploit a vulnerability to breach security and thus cause
possible harm.
It can be either “intentional” (i.e., intelligent; e.g., an individual cracker or a criminal organization) or
“accidental” (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster
such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.
Computer Crime
Computer crime refers to any crime that involves a computer and a network. Net crime refers to
criminal exploitation of the Internet.
Cybercrimes are defined as “Offenses that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm to the victim directly or indirectly, using modern telecommunication
networks such as the Internet (Chat rooms, emails, notice boards, and groups) and mobile phones
(SMS/MMS)”.
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of
crime have become high-profile, particularly those surrounding cracking, copyright infringement, child
pornography, and child grooming. There are also problems of privacy when confidential information
is lost or intercepted, lawfully or otherwise.
Topology of computer crime
Computer crime encompasses a broad range of activities. Generally, however, it may be divided into
two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks
or devices, the primary target of which is independent of the computer network or device.
1. Crimes that primarily target computer networks or devices include Computer viruses,
Denial-of-service attacks, Malware (malicious code)
2. Crimes that use computer networks or devices to advance other ends include: Cyber
stalking, Fraud and identity theft, Information warfare, Phishing scams
Cyber Terrorism
Cyber terrorism in general can be defined as an act of terrorism committed through the use of
cyberspace or computer resources. As such, simple propaganda on the Internet, that there will be
bomb attacks during the holidays can be considered cyber-terrorism.