Basic Cyber Security - W3Schools
Basic Cyber Security - W3Schools
Basic Cyber Security - W3Schools
Cyber Crime
Dark Web
Networking Basics
Network Layer
Network Transport
Firewalls
Web Applications
Network Attacks
WIFI Attacks
Penetration Testing
and
Social Engineering
Passwords
Security Operations
Incident Response
Search field
Log inSign Up Certficates Spaces
❮
HTML CSS JAVASCRIPT SQL PYTHON JAVA PHP HOW TO W3.CSS C C+
+ C# BOOTSTRAP REACT MYSQL JQUERY EXCEL XML DJANGO NODEJS R TYPESCRI
PT ANGULAR GIT POSTGRESQL MONGODB ASP AWS AI GO KOTLIN SASS VUE GEN
AI CYBERSECURITY DATA SCIENCE
❯
CS HOMECS Cyber CrimeCS Money Making ThreatsCS Dark WebCS Networking BasicsCS
Network LayerCS Network TransportCS FirewallsCS Web ApplicationsCS Mapping &
Port ScanningCS Network AttacksCS Web Application AttacksCS WIFI AttacksCS Penetration
Testing &
Social EngineeringCS PasswordsCS Security OperationsCS Incident ResponseCS QuizCS Certificate
Cyber Crime
What is Cyber Crime? Just like regular crime, it also exists on the Internet. Here are
some examples of Cyber Crime:
Identity Theft
Online Predators
BEC ("Business Email Compromise")
Ransomware
Stealing of sensitive intellectual property
Increasing Crime
Cyber Crime has been increasing regularly every year. Why is Cyber Crime on the
rise? Here are some reasons:
Tumblers are services which split up cryptocurrency transactions and forward the
money through many accounts, with different values, for thousands of people,
making them hard to track.
Cyber Criminals
Who are Cyber Criminals? It can be anyone, but let us discuss some common ones
we see in the media all the time:
ADVERTISEMENT
Law enforcement do, however, have many challenges in tracking down cyber-crime.
You might see attack traffic coming in from a system residing in UK, and when
taking down this system, you realize it was being remotely controlled by e.g.
another system in India. Cooperating with law-enforcements across borders, you
might be able to get to the system in India, but only to realize it was again remotely
controlled through e.g. Pakistan.
Search field
Log inSign Up Certficates Spaces
❮
HTML CSS JAVASCRIPT SQL PYTHON JAVA PHP HOW TO W3.CSS C C+
+ C# BOOTSTRAP REACT MYSQL JQUERY EXCEL XML DJANGO NODEJS R TYPESCRI
PT ANGULAR GIT POSTGRESQL MONGODB ASP AWS AI GO KOTLIN SASS VUE GEN
AI CYBERSECURITY DATA SCIENCE
❯
Cyber Security
CS HOMECS Cyber CrimeCS Money Making ThreatsCS Dark Web
Networking
CS Networking BasicsCS Network LayerCS Network TransportCS FirewallsCS Web Applications
Cyber Attacks
CS Mapping &
Port ScanningCS Network AttacksCS Web Application AttacksCS WIFI AttacksCS Penetration
Testing &
Social EngineeringCS Passwords
Cyber Defence
CS Security OperationsCS Incident Response
CS QuizCS Certificate
Driven by Money
There are a few key threats organizations face frequently:
There are plenty of ways of making money for cyber criminals, which attracts people
and interest.
The potential for criminals to make significant amounts of money within the cyber
domain causes more and more criminal gangs and other opportunists to join in on
the action and make our lives much harder.
Threatening for Money
Another common attack cyber criminals perform to make money is the act of
extortion, that is holding individuals hostage based on information they have on a
individual, trying to make them pay money to be released from the extortion
attempt. Consider the following common scenario:
Stories like these are far from uncommon, and there exists countless of different
scenarios and opportunities for criminals to benefit from victims using the Internet
without knowing the risks associated.