Professional Documents
Culture Documents
W9 - Cyber Crime - MODULE
W9 - Cyber Crime - MODULE
1
Module 8: Cyber Crime
Computer crime is a crime like any other crime, except that in this case the illegal act
must involve a computer system either as an object of a crime, an instrument used to commit
a crime, or a repository of evidence related to a crime.
Course Module
IT 6202: Social Issues and Professional Practice
2
Module 8: Cyber Crime
Course Module
IT 6202: Social Issues and Professional Practice
3
Module 8: Cyber Crime
Malicious Insiders
Companies are exposed to a wide range of fraud
risks, including diversion of company funds, theft of
assets, fraud connected with bidding processes, invoice
and payment fraud, computer fraud, and credit card
fraud. Often, frauds involve some form of collusion, or
cooperation, between an employee and an outsider.
Industrial spies
This individuals use illegal means to obtain trade
secrets from competitors of their sponsor. It can involve
the theft of new product designs, production data,
marketing information, or new software source code.
b. Hackers
Hackers penetrate a computer system for a number of reasons
and uses a variety of techniques. Using the skills they have, they
download attack scripts and protocols from the Internet and launch
them against victim sites.
Hackers
They test the limitations of information systems
out of intellectual curiosity. The term hacker has evolved
over the years, leading to its negative connotation today
rather than the positive one it used to have.
Cracking is a form of hacking that is clearly criminal
activity. Crackers break into other people’s networks and
systems to cause harm.
c. Criminal Groups.
While a number of penetration attacks come from insiders and
hackers with youthful intents, there are a number of attacks that
originate from criminal groups.
Cybercriminals are motivated by the potential for
monetary gain and hack into corporate computers to
steal, often by transferring money from one account to
another to another
Course Module
IT 6202: Social Issues and Professional Practice
4
Module 8: Cyber Crime
2. Denial of Service
Denial of service attacks, commonly known as distributed denial of
service (DDoS) attacks, are a new form of computer attacks. They are directed
at computers connected to the Internet. They are not penetration attacks, and
therefore, they do not change, alter, destroy, or modify system resources.
However, they affect the system by diminishing the system’s ability to
function; hence, they are capable of bringing a system down without
destroying its resources.
Unlike penetration attacks, DDoS attacks typically aim to exhaust the
network bandwidth, its router processing capacity, or network stack
resources, thus eventually breaking the network connectivity to the victims.
Course Module
IT 6202: Social Issues and Professional Practice
5
Module 8: Cyber Crime
References:
1. Kizza, Joseph Migga ; 2013; Ethical and Social Issues in the Information Age (Fifth
Edition); London; Springer-Verlag;
2. Tavani, Herman T.; 2013; Ethics And Technology : Controversies, Questions, And
Strategies For Ethical Computing; New Jersey, USA; John Wiley & Sons, Inc.
3. George Reynolds (2018) Ethics in Information Technology / Edition 6
4. https://technology.inquirer.net/34360/in-the-know-the-cybercrime-
law#ixzz60zKzLYq1
Course Module