Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Untitled Presentation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Who Are Cyber Criminals?

1. Identity Thieves

Identity thieves are cyber criminals who try to gain access to their victims’ personal
information – name, address, phone number, place of employment, bank account,
credit card information and social security number.

They use this information to make financial transactions while impersonating their
victims. Identity theft is one of the oldest cyber crimes, gaining prominence during
the early years of the Internet.
2. Internet Stalkers

Internet stalkers are individuals who maliciously monitor the online activity of their
victims to terrorize and/or acquire personal information.

This form of cyber crime is conducted through the use of social networking platforms
and malware, which are able to track an individual’s computer activity with very little
detection.

The motives for such attacks can differ depending on the cyber criminal, but many
internet stalkers seek to acquire important information that they can use for bribery,
slander, or both.
3. Phishing Scammers

Phishers are cyber criminals who attempt to get ahold of personal or sensitive
information through victims’ computers.

This is often done via phishing websites that are designed to copycat small-
business, corporate or government websites.

Unsuspecting computer users often fall prey to such activities by unknowingly


providing personal information including home addresses, social security numbers,
and even bank passwords.
4. Cyber Terrorists

Cyber terrorism is a well-developed, politically inspired cyber attack in which the cyber criminal
attempts to steal data and/or corrupt corporate or government computer systems and networks,
resulting in harm to countries, businesses, organizations, and even individuals.

The key difference between an act of cyberterrorism and a regular cyber attack is that within an act
of cyber terrorism, hackers are politically motivated, as opposed to just seeking financial gain.
Cyber Crime Techniques

Botnet – a strategically developed network of bots which crawl the backend of the web to spread malware with very little
detection.
Zombie Computer – a computer which is deliberately hacked by cyber criminals in order to gain access to and/or attack
a private network.
Distributed Denial of Service (DDoS) – with a DDoS attack, cyber criminals are not necessarily seeking to access data,
but rather are hoping to shut down a network via an overload of junk data. An example of a DDoS attack occurred on
Friday, October 21, 2016, when cyber criminals shut down a number of highly utilized websites, including Twitter,
Spotify, and Amazon.
Metamorphic Malware – one of the more advanced techniques, metamorphic malware, repeatedly adjusts its code,
making it extremely difficult to detect by even the most advanced anti-virus software. Experts predict that by the end
of 2017, there will be an emergence of malware that can infiltrate networks, steal information and cover up their
activities. These forms of malware will make it difficult for government agencies and businesses to establish the
extent to which data has been tampered with, as well as prevent law enforcement from pursuing and prosecuting the
offenders.
Countermeasures Against Cyber Attacks

Network Encryption – a security protocol implemented at the network level which


encrypts data so network access is limited to authorized computers.
Proxies – a security strategy which connects users to a remote location so that their
data and information is encrypted. Proxies can allow users the ability to manipulate
their shared information so a potential hacker would acquire wrong or misleading
data.
Firewalls – a network wall which helps users prevent access from dangerous parties.

You might also like