Professional Documents
Culture Documents
What Is Cybercrime?: (Source: Adapted From Handbook. The Language of Cybercrime. EJTN, 2018)
What Is Cybercrime?: (Source: Adapted From Handbook. The Language of Cybercrime. EJTN, 2018)
In this text, some of the main terms have been replaced with a definition which is
numbered and highlighted in bold. Please provide the missing terms.
• Cybercrime has now surpassed illegal (1) [two words] _________ _________ “a
global illicit trade involving the cultivation, manufacture, distribution and
sale of substances which are subject to drug prohibition laws” … as a criminal
moneymaker.
Criminals committing cybercrime use a number of methods, depending on their skills and their
goal. Here are some of the different ways cybercrime can take shape:
As you can see, cybercrime covers a wide range of different attacks, that all deserve their own
unique approach when it comes to improving our computer's safety and protecting ourselves. A
possible definition of Cybercrime is "any crime that is committed using a computer network or
hardware device".
The computer or device may be the agent of the crime, the facilitator of the crime, or the target of
the crime. The crime may take place on the computer alone or in addition to other locations. The
broad range of cybercrime can be better understood by dividing it into two overall categories:
Type I and Type II cybercrime. Let’s take a look at them both:
Type 1 cybercrime
Any cybercrime that relates to theft or manipulation of data or services via hacking or viruses,
identity theft, and bank or e-commerce fraud.
• Usually a single event from the perspective of the victim. An example would be where the
victim unknowingly downloads a (10) [two words] ________ __________ “any
malicious computer program which is used to hack into a computer by
misleading users of its true intent” … virus, which installs a (11) [two words]
________ __________ “a system for recording (logging) the keys struck on
a keyboard, typically covertly, so that the person using the keyboard is
unaware that their actions are being monitored”… on his or her machine. The (12)
_________ ___________ (same as 11 above) allows the (13) [one word]
_____________ “someone who seeks and exploits weaknesses in a
computer system or computer network”… to steal private data such as internet
banking and email passwords.
• Another common form of Type 1 cybercrime is (14) [one word] _____________ “a
form of fraud in which the attacker tries to learn information such as login
credentials or account information by masquerading as a reputable entity or
person in email, IM or other communication channels”. This is where the victim
receives a supposedly legitimate email (quite often claiming to be a bank or credit card
company) with a link that leads to a hostile website. Once the link is clicked, the PC can
then be infected with a (15) [one word] _____________ “a malware that, when
executed, replicates by reproducing itself or infecting other programs by
modifying them”.
Hackers often carry out Type 1 cybercrime by taking advantage of flaws in a (16) [two words]
________ __________ “a software application used to locate, retrieve and
display content on the World Wide Web, including Web pages, images, video and
other files” to place a Trojan horse virus onto the unprotected victim’s computer
Type 2 cybercrime
Type 2 cybercrime tends to be much more serious and covers things such as cyberstalking and
harassment, (17) [two words] ________ __________ “obtaining or trying to obtain
sexual contact with a child in an abusive manner which is compared to the way some
animals hunt down their prey”, (18) [one word] ________ “the obtaining of
property from another person, induced by wrongful use of actual or threatened
force, violence, or fear”, (19) [one word] ________ “a threat for the purposes of
compelling a person to do an act against his or her will, or for purposes of taking the
person's money or property”, stock market manipulation, (20) [two words] ________
__________ “attempting to obtain trade secrets for comercial purposes by
dishonest means, as by telephone, computer-tapping, or infiltration of a
competitor's workforce”, and planning or carrying out terrorist activities.
It is generally an on-going series of events, involving repeated interactions with the target. For
example, the target is contacted in a (21) [two words] ________ __________ “a virtual
room (actually a channel) where conversations take place” by someone who, over time,
attempts to establish a relationship. Eventually, the criminal exploits the relationship to commit
a crime. Or, members of a (22) [two words] ________ __________ “a reduced,
organised group of terrorists” or criminal organisation may use hidden messages to
communicate in a public forum to plan activities or discuss (23) [two words] ________
__________ “a financial transaction scheme that aims to conceal the identity,
source, and destination of illicitly-obtained money”… locations, for example.
More often than not, it is facilitated by programs that do not fit under the classification (24) [one
word] ________ “general term to refer to malicious software that is designed to
commit crimes on the Internet”. For example, conversations may take place using (25)
[two words] ________ __________ “a type of communications service that
enables you to create a kind of private chat room with another individual in order
to communicate in real time over the Internet using text-based, communication” …
clients or files may be transferred using (26) [three words] ________ __________
_____________ “protocols for exchanging files over the Internet”.
ANSWER KEY
What is cybercrime?
In this text, some of the main terms have been replaced by a definition which is
numbered and highlighted in bold. Please provide the missing terms.
• Cybercrime has now surpassed illegal (1) drug trafficking as a criminal moneymaker.
• Without a sophisticated security package, your unprotected (2) PC can become infected
within four minutes of connecting to the (3) Internet.
Criminals committing cybercrime use a number of methods, depending on their skills and their
goal. Here are some of the different ways cybercrime can take shape:
• (6) Fraud
• (8) Cyberstalking
• (9) Bullying
As you can see, cybercrime covers a wide range of different attacks, that all deserve their own
unique approach when it comes to improving our computer's safety and protecting ourselves. A
possible definition of Cybercrime is "any crime that is committed using a computer network or
hardware device".
The computer or device may be the agent of the crime, the facilitator of the crime, or the target of
the crime. The crime may take place on the computer alone or in addition to other locations. The
broad range of cybercrime can be better understood by dividing it into two overall categories:
Type I and Type II cybercrime. Let’s take a look at them both:
Type 1 cybercrime
Any cybercrime that relates to theft or manipulation of data or services via hacking or viruses,
identity theft, and bank or e-commerce fraud.
• Usually a single event from the perspective of the victim. An example would be where the
victim unknowingly downloads a (10) Trojan horse virus, which installs a (11)
keystroke logger on his or her machine. The (12) keystroke logger allows the (13)
hacker to steal private data such as internet banking and email passwords.
• Another common form of Type 1 cybercrime is (14) phishing. This is where the victim
receives a supposedly legitimate email (quite often claiming to be a bank or credit card
company) with a link that leads to a hostile website. Once the link is clicked, the PC can
then be infected with a (15) virus.
Hackers often carry out Type 1 cybercrime by taking advantage of flaws in a (16) web browser
to place a Trojan horse virus onto the unprotected victim’s computer
Type 2 cybercrime
Type 2 cybercrime tends to be much more serious and covers things such as cyberstalking and
harassment, (17) child predation, (18) extortion, (19) blackmail, stock market
manipulation, (20) corporate espionage, and planning or carrying out terrorist activities.
It is generally an on-going series of events, involving repeated interactions with the target. For
example, the target is contacted in a (21) chat room by someone who, over time, attempts to
establish a relationship. Eventually, the criminal exploits the relationship to commit a crime. Or,
members of a (22) terrorist cell or criminal organisation may use hidden messages to
communicate in a public forum to plan activities or discuss (23) money laundering locations,
for example.
More often than not, it is facilitated by programs that do not fit under the classification (24)
‘crimeware’. For example, conversations may take place using (25) instant messaging (IM)
clients or files may be transferred using (26) file transfer protocols (FTPs).