What is cyber crime

What is Cyber Crime?

The 10 types of Cyber Crime

Statistics

Cyber criminals, also known as fraudsters or hackers depending on the crime, are constantly developing new ways to steal data or money via the internet a computer. A Government report on Cyber Security Breaches released this year showed that 43% of UK businesses and 19% of charities reported a cyber breach or attack in the last 12 months. Worryingly the report also showed that just 59% of businesses and 42% of charities sought information, advice or guidance on cyber security threats to their organisation.

There are many different types of cyber crime that everyone must be aware of to protect their business and themselves as individuals. Here are a few of the key methods:

Statistics

Types of Cyber Crime

Identity Theft

Identity Theft

Identity theft is a crime whereby criminals impersonate individuals usually for financial gain. In today's society, the fraudsters often steal personal information about yourself, such as your National Insurance number, signature, name, address, phone number, mobile number or even banking and credit card information.

Phishing

Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and indirectly money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing emails may also contain links to websites that are infected with malware. This is software that can steal your data and/or lock you out of your
systems.

Cyber Stalking

Cyber Stalking

Cyberstalking, simply put, is online stalking. It has been defined as the use of technology, particularly the Internet, to harass someone. Common characteristics include false accusations, monitoring, threats, identity theft, and data destruction or manipulation.

Child Exploitation

Child Exploitation

Online abuse is any type of abuse that happens on the web, whether through social networks, playing online games or using mobile phones. Children and young people may experience cyberbullying, grooming, sexual abuse, sexual exploitation or emotional abuse.

Cyber Bullying

Cyber Bullying

Children can be at risk of online abuse from people they know, as well as from strangers. Online abuse may be part of abuse that is taking place in the real world, for example, bullying or grooming.

Webjacking

Webjacking

The Web Jacking Attack Vector is another phishing technique that can be used in social engineering engagements. Attackers create a fake website and when the victim opens the link a page appears with the message that the website has moved, and they need to click another link. If the victim clicks the link he will be redirected to a fake page.

Data Sheet

Data Sheet

Is a term used to describe when information is illegally copied or taken from a business or other individual. Commonly this information is user information such as passwords, social security numbers, credit card information, other personal information, or other confidential corporate information.

Denial of Service

Denial of Service

In computing, a denial-of- service attack (DOS attack) is an-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Hacking

Hacking

Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creators original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”

Malicious Malware

Malicious Malware

Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of harmful or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user.