0% found this document useful (0 votes)
30 views5 pages

Cyber Crime

The document defines key terms related to cyber activities, including 'cyber', 'crime', and 'cybercrime', which encompasses illegal actions involving computers and the internet. It categorizes cybercrime into four main types: against individuals, property, organizations or governments, and society, providing examples for each. Additionally, it describes various types of cybercriminals, such as hackers, scammers, and state-sponsored hackers, detailing their actions and motivations.

Uploaded by

rheapegolio8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Cyber Crime

The document defines key terms related to cyber activities, including 'cyber', 'crime', and 'cybercrime', which encompasses illegal actions involving computers and the internet. It categorizes cybercrime into four main types: against individuals, property, organizations or governments, and society, providing examples for each. Additionally, it describes various types of cybercriminals, such as hackers, scammers, and state-sponsored hackers, detailing their actions and motivations.

Uploaded by

rheapegolio8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Cyber

Definition:
"Cyber" is a prefix used to describe anything related to computers, digital technology,
or the internet.

-The word "cyber" is often used in combination with other terms to describe activities
or things connected to the digital world.

Example: Cybersecurity means protecting computer systems and networks from


attacks or unauthorized access.

-Another example is cyberbullying, which refers to bullying someone through


messages, social media, or emails.

2. Crime

Definition:
A crime is any action that breaks the law and can be punished by the government.

-Crimes are actions that harm individuals, property, or society and are considered
illegal.

Example: Stealing a car, committing fraud, or physically attacking someone are all
examples of crimes.

People who commit crimes may be arrested, fined, or sent to jail.

3. Cybercrime

Definition:
Cybercrime is any illegal activity that involves a computer, digital system, or the
internet.

-Cybercrime uses technology to commit illegal actions. This can include hacking into
someone’s email, stealing personal information, or spreading viruses.

Example 1: A hacker breaking into a bank’s computer system to steal money.

Example 2: Creating fake websites to trick people into giving up their credit card
information (a type of scam known as phishing).

Example 3: Distributing pirated movies or software online.


4. Cyberspace

Definition:
Cyberspace is the online or digital world created by computer networks where people
can communicate, share data, and interact virtually.

-Cyberspace is not a physical space you can touch—it's the environment you enter
when you go online. It includes websites, social media, emails, online games, and
more.

Example: When you log in to Facebook, visit Google, or chat on WhatsApp, you are
using cyberspace.

-It’s also where cybercrimes, like hacking or online scams, can happen.

CATEGORIES OF CYBER CRIME

1. Cybercrime Against Individuals

Description:
These crimes directly target people and often involve stealing personal information or
causing emotional harm.

Examples:

Cyberbullying: Harassing or threatening someone online.

Identity Theft: Stealing someone's personal data (e.g., name, bank info) to commit
fraud.

Phishing: Sending fake emails to trick people into giving sensitive information.

Online Scams and Fraud: Fake lotteries, job offers, or romance scams.

2. Cybercrime Against Property

Description:
These crimes involve attacks on digital property such as data, files, websites, or
devices.

Examples:

Hacking: Gaining unauthorized access to someone’s computer or network.

Spreading Malware or Viruses: Infecting devices with software that damages or


steals data.
Denial-of-Service (DoS) Attacks: Overloading a website to make it unavailable.

Website Defacement: Illegally changing the appearance or content of a website.

3. Cybercrime Against Organizations or Governments

Description:
Crimes that target institutions, public services, or national security systems.

Examples:

Cyberterrorism: Using the internet to threaten national security (e.g., hacking


government systems).

Corporate Espionage: Stealing trade secrets or confidential data from a company.

Cyberwarfare: Nation-state attacks on other countries’ digital infrastructure.

Ransomware Attacks: Locking important data until a ransom is paid.

4. Cybercrime Against Society

Description:
These crimes affect the public, culture, or moral values of a society.

Examples:

Spreading Fake News or Misinformation: Deliberately sharing false info to mislead


people.

Distributing Illegal or Harmful Content: Sharing child pornography, hate speech,


or extremist materials.

Drug or Weapon Trafficking via the Dark Web: Using the internet to sell banned
goods.
TYPES OF CYBER CRIMINAL

1. Hackers

Description: Individuals who break into computer systems or networks.

Black Hat Hackers – Malicious hackers (commit crimes).

White Hat Hackers – Ethical hackers (help secure systems).

Grey Hat Hackers – In-between (break rules but not for harm).

2. Crackers

Description: Cyber criminals who break security codes to access or distribute illegal
software.

3. Cyber Terrorists

Description: Use the internet to conduct terror attacks, threaten national security, or
spread fear.

Example: Hacking government websites or infrastructure to cause panic.

4. Cyber Stalkers

Description: Use digital platforms to harass, monitor, or intimidate someone


continuously.

Example: Repeatedly sending threatening messages or tracking someone's location


online.

5. Scammers / Fraudsters

Description: Trick people into giving money or sensitive information.

Example: Phishing emails pretending to be from banks or online services.

6. Identity Thieves

Description: Steal and use someone else's personal data for fraud.
Example: Using stolen information to open bank accounts or make purchases.

7. Spammers

Description: Send large volumes of unsolicited messages, often with malicious links.

Example: Fake emails about winning a lottery or free gifts to trick users.

8. Insiders (Disgruntled Employees)

Description: Employees or former staff who misuse internal access to steal or destroy
information.

Example: An employee leaking confidential company data after being fired.

9. Script Kiddies

Description: Inexperienced individuals who use existing tools or scripts to launch


attacks, without deep technical knowledge.

Example: Downloading a hacking tool to crash websites just for fun.

10. State-sponsored Hackers

Description: Hackers working for a government to perform espionage or cyberattacks


against other nations.

Example: Stealing military secrets or interfering in another country’s elections.

You might also like