Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Introduction to cyber offenses

Beoordeling
-
Verkocht
-
Pagina's
13
Geüpload op
30-01-2024
Geschreven in
2023/2024

How Criminals Plan Them:Introduction, How criminals plan the attacks, Social Engineering, Cyber Stalking, Cybercaafe & cybercrimes. Botnets: The fuel for cybercrime, Attack Vector.

Instelling
Vak

Voorbeeld van de inhoud

M1: Introduction to cyber crime BETCK105I Dr. Srilakshmi Prabhu



Module 1 – Introduction to cyber crime

1. Some important definitions
Cybercrime is defined as “Any unlawful, illegal or criminal activity committed using
computer network, the Internet, cyberspace and the WWW to steal a person’s identity or
sell contraband or violate privacy, trafficking in child pornography or stalk victims or
disrupt operations with malwares.”
Cyber security refers to application of technologies, processes and, methods to protect
server, computer, network, electronic system (smartphones, laptops, tablets, etc), data and
the services we access - both online and at work – from any unauthorized access through
malicious cyber-attacks.
Hacking refers to act of gaining unlawful or unauthorized access to another’s digital device,
computer system or computer network or server.
Cyber warfare refers to the use of computer or digital network for attacking, hacking, and
other carrying out malicious activities in the context of conflicts between nations, states, or
other organized groups. These attacks are aimed at disrupting, damaging, or gaining
unauthorized access to computer systems, networks, and infrastructure with the intent of
causing harm.
Cyberpunk refers to a genre of fiction that often explores themes related to hacking,
computer security, and the implications of advanced technology on society. Cyberpunk
literature, movies, and other media often depict hackers as central characters who use their
expertise to exploit or manipulate computer systems, challenge powerful organizations, and
navigate the complexities of cyberspace.
2. Who are cybercriminals? List and explain the categories cybercriminals.
(10 marks)

Cybercriminals are those who conduct act such as child pornography; credit card fraud, cyber
stalking, defame another online; gaining unauthorised access to a computer system; ignoring
copyright, software licensing and Trademark protection; overriding encryption to make illegal
copies; software piracy and stealing another's identity to perform criminal acts.

They can be categorised into three groups that reflect their motivation:

• Type I: Cybercriminals hungry for recognition

• Type II: Cybercriminals not interested in recognition

, M1: Introduction to cyber crime BETCK105I Dr. Srilakshmi Prabhu


• Type III: Cybercriminals the insiders

Type I cybercriminals are those who are hungry for recognition and seek fame for their action.
This category includes:

a. Hobby hackers: A person who enjoys exploring the limits of what is possible in the
spirit of play full cleverness

b. IT professionals: ethical hacker

c. Politically motivated hackers: promote the objective of individuals groups or Nation
supporting a variety of causes such as anti-globalization transitional conflict and
protest.

d. Terrorist organizations: cyber terrorism terrorist using the internet for attacks, large
scale destruction of computer networks.

Type II cybercriminals are those who are not interested to seek and recognition and seek fame
for their action. This category includes:

a. Psychological perverts: Express sexual Desire deviate from normal behaviour

b. Financially motivated hackers: make money from cyberattacks: bots for hire; fraud
through phishing information theft, spam and extortion.

c. State actors: Extremely professional groups working for governments.

d. Organized criminals: have the ability to worm into the network of media, major
corporations and different departments.

Type III cybercriminals are the insiders or internal attackers like:

a. Disgruntled or former employees seeking revenge

b. Competing companies using employees to gain economic advantage through the
damage for theft.

3. List the classification of cybercrimes. (6 marks)

Cybercrime is mainly classified into five types, namely:

1. Cybercrime against individual
a. E-mail spoofing
b. Spamming
c. Cyber stalking

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
30 januari 2024
Aantal pagina's
13
Geschreven in
2023/2024
Type
SAMENVATTING

Onderwerpen

$11.59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
srilakshmiprabhuphyresearch

Maak kennis met de verkoper

Seller avatar
srilakshmiprabhuphyresearch CIT-NC
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen