What is Cyber Crime?
The 10 types of Cyber Crime
Cyber criminals, also known as fraudsters or hackers depending on the crime, are constantly developing new ways to steal data or money via the internet a computer. A Government report on Cyber Security Breaches released this year showed that 43% of UK businesses and 19% of charities reported a cyber breach or attack in the last 12 months. Worryingly the report also showed that just 59% of businesses and 42% of charities sought information, advice or guidance on cyber security threats to their organisation.
There are many different types of cyber crime that everyone must be aware of to protect their business and themselves as individuals. Here are a few of the key methods:
Types of Cyber Crime
Identity theft is a crime whereby criminals impersonate individuals usually for financial gain. In today's society, the fraudsters often steal personal information about yourself, such as your National Insurance number, signature, name, address, phone number, mobile number or even banking and credit card information.
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and indirectly money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing emails may also contain links to websites that are infected with malware. This is software that can steal your data and/or lock you out of your
Cyberstalking, simply put, is online stalking. It has been defined as the use of technology, particularly the Internet, to harass someone. Common characteristics include false accusations, monitoring, threats, identity theft, and data destruction or manipulation.
Online abuse is any type of abuse that happens on the web, whether through social networks, playing online games or using mobile phones. Children and young people may experience cyberbullying, grooming, sexual abuse, sexual exploitation or emotional abuse.
Children can be at risk of online abuse from people they know, as well as from strangers. Online abuse may be part of abuse that is taking place in the real world, for example, bullying or grooming.
The Web Jacking Attack Vector is another phishing technique that can be used in social engineering engagements. Attackers create a fake website and when the victim opens the link a page appears with the message that the website has moved, and they need to click another link. If the victim clicks the link he will be redirected to a fake page.
Is a term used to describe when information is illegally copied or taken from a business or other individual. Commonly this information is user information such as passwords, social security numbers, credit card information, other personal information, or other confidential corporate information.
Denial of Service
In computing, a denial-of- service attack (DOS attack) is an-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creators original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of harmful or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user.