Midterm W5

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Comp 2:

2-1A500
March 20, 2023
10:30 – 11:30 am
INTENDED LEARNING OUTCOMES
Types of Cyber Crimes
At the end of this session, students will be
able to:
1. Determine crimes that can be
committed with the use of the internet;
and
2. Identify the acts that can be categorized
as cybercrime.
TYPES
CYBERCRIMES
WEEK 05
Cybercrime
Cybercrime is a prohibited action against any person using a
computer, its systems, and its online or offline applications.
is a prohibited action against any person using a computer, its systems, and its online or offline
Some of the cyber crimes are the following: Malware
applications. It

or malicious software, botnet, rootkit, worm, trojan, file


infector, backdoor/remote access trojan, ransomware,
scareware, spyware, and adware.
TYPES OF
CYBERCRIMES
Types of Cybercrimes

Malware or malicious softwares


infiltrate and gain control over a
computer system or a mobile device
High-tech to steal valuable information or
crimes damage data. There are many types
of malware, and they can
complement each other when
performing an attack.
Types of Cybercrimes

(short for robot network) is made up


of computers communicating with
each other over the internet. A
Botnet command and control center uses
them to send spam, mount
distributed denial-of-service (DDoS)
attacks, and commit other crimes.
Types of Cybercrimes

is a collection of programs that


enable administrator-level access to
a computer or computer network,
Rootkit thus allowing the attacker to gain
root or privileged access to the
computer and possibly other
machines on the same network..
Types of Cybercrimes

replicates itself over a computer


network and performs malicious
actions without guidance.
Worm
Types of Cybercrimes

poses as or is embedded within a


legitimate program, but it is
designed for malicious purposes
Trojan such as spying, stealing data,
deleting les, expanding a botnet,
and performing DDoS attacks.
Types of Cybercrimes

infects executable files (such as .exe)


by overwriting them or inserting
infected code that disables them.
File infector
Types of Cybercrimes

accesses a computer system or mobile


device remotely. It can be installed by
another piece of malware. It gives almost
Backdoor/remote total control to the attacker, who can
-access trojan perform a wide range of actions including
(RAT) (a) monitoring actions; (b) executing
commands; (c) sending files and
documents back to the attacker; (d)
logging keystrokes; and
(e) taking screenshots.
Types of Cybercrimes

stops users from accessing their devices


and demands that they pay a ransom
through certain online payment methods
Ransomware to regain access. A variant, police
ransomware, uses law enforcement
symbols to lend authority to the ransom
message.
Types of Cybercrimes

is fake anti-virus software that pretends


to scan and find malware/security threats
on a user’s device so that they will pay to
Scareware have it removed.
Types of Cybercrimes

is installed on a computer without its


owner’s knowledge to monitor their
activity and transmit the information to a
Spyware third party.
Types of Cybercrimes

displays advertising banners or pop-ups


that include code to track the user’s
behavior on the internet.
Adware
Summary
• The most common cybercrimes are the following: fraud by
manipulating computer network; unauthorized access to
or modification of data or application; intellectual
property theft that includes software piracy; industrial
spying and access to or theft of computer material; writing
or spreading computer viruses or malware; and digitally
distributing child pornography.
Summary
• By identifying all of the types of cybercrimes and related
activities, we will be able to prevent and counterattack
these cyber criminals. The thought that the internet is a
big source of information could also lead to different
disadvantages.
• Understanding the types of cybercrimes and their damage
or negative outcome to the community will give an idea to
criminology students on how to solve cybercrime using the
same platform or technology the criminal uses.

You might also like