Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

INTERNET

COMPUTER CRIMES
Name: Alex B. Portez
Course/Year: BSIS-2
In May 2000, the IC3 was established as a center to
receive complaints of Internet crime. A total of
5,679,259 complaints have been reported to the IC3
since its inception. Over the last five years, the IC3 has
received an average of 440,000 complaints per year.
These complaints address a wide array of Internet
scams affecting victims across the globe.1
There are so many types of Internet
Computer Crimes that happen and are
experienced by many people but there are
the most and top 5 that they encounter
most often..
The most frequently encountered
Internet computer crimes
■ Phishing/Vishing/Smishing/Pharming
■ Non-Payment/Non-Delivery
■ Extortion
■ Personal Data Breach
■ Identity Theft
1. Phishing/Vishing/Smishing/Pharming
The use of unsolicited email, text messages, and
telephone calls purportedly from a legitimate
company requesting personal, financial, and/or
login credentials.
• Phishing is one of the most commonly used
methods of Internet fraud at this time. It is a kind of
obtaining secret information by an attacker who
uses the well-known methods of social
engineering to make the users to open their
personal data themselves.

• Vishing (vishing – voice+phishing) is another variety


of phishing that also uses methods of social
engineering, but with the help of a phone call.
• A Smishing message can have a form of notification
from a well-known bank, familiar company or it may
be an information about sudden winning a lottery
etc. In the case of SMS to detect a trick is more
difficult than with phishing via email, because the
messages are short and have not so much
information except for the link itself.
• The main peculiarity of pharming is the unobvious
substitution of the original website for fraudulent,
allowing an attacker to acquire the confidential
user’s data. All this is done by using the DNS cache
on the end user’s device or on the provider’s
network equipment. After the exchange, the attacker
should only wait until the client authorizes on a
certain resource.
2. Non-Payment/Non-Delivery
In non-payment situations, goods and services
are shipped, but payment is never rendered. In
non-delivery situations, payment is sent, but
goods and services are never received.
3. Extortion
Unlawful extraction of money or property through
intimidation or undue exercise of authority. It
may include threats of physical harm, criminal
prosecution, or public exposure.
4. Personal Data Breach
A leak/spill of personal data which is released
from a secure location to an untrusted
environment. Also, a security incident in which
an individual’s sensitive, protected, or
confidential data is copied, transmitted, viewed,
stolen or used by an unauthorized individual.
5. Identity Theft
Someone steals and uses personal identifying
information, like a name or Social Security
number, without permission to commit fraud or
other crimes and/or (Account Takeover) a
fraudster obtains account information to
perpetrate fraud on existing accounts.
References:
https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf
https://www.protectimus.com/blog/phishing-vishing-smishing-pharming/

You might also like