Untitled Presentation
Untitled Presentation
Untitled Presentation
1. Identity Thieves
Identity thieves are cyber criminals who try to gain access to their victims’ personal
information – name, address, phone number, place of employment, bank account,
credit card information and social security number.
They use this information to make financial transactions while impersonating their
victims. Identity theft is one of the oldest cyber crimes, gaining prominence during
the early years of the Internet.
2. Internet Stalkers
Internet stalkers are individuals who maliciously monitor the online activity of their
victims to terrorize and/or acquire personal information.
This form of cyber crime is conducted through the use of social networking platforms
and malware, which are able to track an individual’s computer activity with very little
detection.
The motives for such attacks can differ depending on the cyber criminal, but many
internet stalkers seek to acquire important information that they can use for bribery,
slander, or both.
3. Phishing Scammers
Phishers are cyber criminals who attempt to get ahold of personal or sensitive
information through victims’ computers.
This is often done via phishing websites that are designed to copycat small-
business, corporate or government websites.
Cyber terrorism is a well-developed, politically inspired cyber attack in which the cyber criminal
attempts to steal data and/or corrupt corporate or government computer systems and networks,
resulting in harm to countries, businesses, organizations, and even individuals.
The key difference between an act of cyberterrorism and a regular cyber attack is that within an act
of cyber terrorism, hackers are politically motivated, as opposed to just seeking financial gain.
Cyber Crime Techniques
Botnet – a strategically developed network of bots which crawl the backend of the web to spread malware with very little
detection.
Zombie Computer – a computer which is deliberately hacked by cyber criminals in order to gain access to and/or attack
a private network.
Distributed Denial of Service (DDoS) – with a DDoS attack, cyber criminals are not necessarily seeking to access data,
but rather are hoping to shut down a network via an overload of junk data. An example of a DDoS attack occurred on
Friday, October 21, 2016, when cyber criminals shut down a number of highly utilized websites, including Twitter,
Spotify, and Amazon.
Metamorphic Malware – one of the more advanced techniques, metamorphic malware, repeatedly adjusts its code,
making it extremely difficult to detect by even the most advanced anti-virus software. Experts predict that by the end
of 2017, there will be an emergence of malware that can infiltrate networks, steal information and cover up their
activities. These forms of malware will make it difficult for government agencies and businesses to establish the
extent to which data has been tampered with, as well as prevent law enforcement from pursuing and prosecuting the
offenders.
Countermeasures Against Cyber Attacks