SlideShare a Scribd company logo
1 of 40
Computer and Cybercrimes
Module 2
MODULE OUTCOMES:
• At the end of each topic, the student must have:
– explained the difference between computer crime and
cybercrime;
– discussed the different types of computer crime and
cybercrime;
– explained how a computer is used as a tool to commit
a crime;
– explained how the computer becomes an object of
the crime.
COMPUTER CRIME
• Computer Crime
– Computer crime pertains to a criminal act
committed through the use of a
computer (salzmanattorney.com , n.d.)
– Computer crime covers or describes
several offenses and that also covers non-
computer offenses such as larceny and
fraud, except that a computer or the
Internet is used in committing the crime
(criminal.findlaw.com, 2019)
COMPUTER CRIME
• Examples of Computer Crime include the following:
– Improperly accessing a computer, system, or network;
– Modifying, damaging, using, disclosing, copying, or
taking programs or data;
– Introducing a virus or other contaminant into a
computer system;
– Using a computer in a scheme to defraud;
– Interfering with someone else's computer access or
use;
– Using encryption in aid of a crime;
– Falsifying email source information; and
– Stealing an information service from a provider.
criminal.findlaw.com, 2019
COMPUTER CRIME
• Improperly Accessing a Computer, System, or Network
– Improper access can also mean unauthorized
access. Computer users and network
administrators have passwords to access the
system for security reasons.
– Unauthorized or improper access to a computer,
system, or network includes access to a personal
computer or a network of computers without
acquiring permission or knowledge from the user
or administrator.
– Unauthorized access may also refers to as
Hacking. Since hacking is an act of gaining access
to a system without permission or authorization.
criminal.findlaw.com, 2019
COMPUTER CRIME
• Modifying, damaging, using, disclosing, copying, or taking
programs or data
– Data or information stored in computers or networks,
especially by hospitals, business firms, schools, government
agencies, and even by private individuals are treated with the
utmost confidentiality and are considered private. This simply
means that these data and/or information must be protected
from all kinds of abuses. This is the main reason for having the
Data Privacy Law.
– Information Theft on the other hand is defined as the stealing
of data and/or information while Software Theft is defined as
copying of programs without the permission of the authorized
owner. Information and Software Theft are considered as
computer crimes and it violates the Data Privacy Law.
criminal.findlaw.com, 2019
COMPUTER CRIME
• Using a computer in a scheme to defraud
– Computer Fraud. Computer fraud is defined as an
act of deceiving a victim to gain information,
money, and other important information through
the use of a computer.
criminal.findlaw.com, 2019
www.abc2c.com.au
COMPUTER CRIME
• Interfering with someone else’s computer access or use
– Denial of Service Attack or Distributed Denial of
Service Attack (DDoS) can interfere with one’s access
to Internet services through the client’s computer.
DDoS makes an online service unavailable to users by
simply interrupting the service temporarily and by
doing this, the perpetrator can prevent the user to
process and accomplished tasks properly.
– The first recorded DoS attack occurred in February
2000, when a 15-year-old Canadian hacker hit
Amazon and eBay web servers with this attack. Since
then, more and more people have used DoS attacks to
disrupt targets.
criminal.findlaw.com, 2019
lifars.com, 2020
COMPUTER CRIME
• DDoS, How it works?
criminal.findlaw.com, 2019
lifars.com, 2020
COMPUTER CRIME
– Hardware Vandalism and
Hardware Theft also
interferes with someone
else’s access and/or use of
a computer.
• Hardware Vandalism is an act
of defacing or destroying a
computer and/or digital
equipment.
• Hardware Theft refers to
stealing the physical part of the
computer system and/or the
digital equipment.
criminal.findlaw.com, 2019
texomashomepage.com
Olney schools (TEXAS) were
closed for a day in 2015 after
vandals struck two schools there
overnight (Foy, M.2015)
COMPUTER CRIME
• Using encryption in aid of a crime
– Encryption is a process of converting data known as
Data Encryption to an unreadable form. This is usually
done to secure and protect data and/or information
against unauthorized access and use. To make the
data readable again it must be decrypted. The sending
party uses an algorithm to encrypt the data and the
receiving party should have access to what they called
a key or password to decrypt the data.
– Although encryption is usually used to protect highly
classified data against illegal or unauthorized access
and use, computer and cybercriminals also use this
technique to cover their illegal activities, making them
undetectable or at least giving the authority a hard
time detecting them, thus, giving them enough time
to accomplish their plan.
criminal.findlaw.com, 2019
lifars.com, 2020
COMPUTER CRIME
• Falsifying email source information
– Falsification of email source information can refer
to Email Spoofing and Phishing.
• Email spoofing is an act of making email messages
with fake sender addresses, pretending to be legit to
gain access to the victim’s information, computer,
etc. to carry out a cyber-attack.
• Phishing is a deceitful or fraudulent act of getting
important information such as user accounts, bank
accounts, and credit card numbers from a victim
through online messages or websites pretending to
be legit. Phishing may lead to Information Theft and
Identity Theft.
criminal.findlaw.com, 2019
lifars.com, 2020
COMPUTER CRIME
An example of an Email spoofing.
Thoke, O. ,(2019) www.lifewire.com/
COMPUTER CRIME
An example of an Phishing.
resources.infosecinstitute.com
COMPUTER CRIME
• Stealing an information service from a provider
– Internet Theft of Service is the stealing of the
Internet service itself as stated by Hollingsworth
(2018) and this may be accomplished by physically
rerouting Internet cables or by hacking into a wireless
Internet wi-fi connection account.
– An example of this is when a certain person uses
another person’s Internet connection without
authorization from the Internet Service Provider even
the person subscribing to the Internet allows it.
• Mooching or Piggybacking is another common example
of Internet Theft of Service, and is also considered as a
crime. This happens when the person or the “moocher”
can gain access to wi-fi by breaking a subscriber’s
Internet password.
criminal.findlaw.com, 2019
lifars.com, 2020
Common Types of Computer Crime
• Hacking/ Cracking
– Hacking is an act or practice of gaining unauthorized access
to a computer system and the person doing this is called a
hacker. But the hacker community disagree with this kind of
definition since some of them are Ethical Hacker which
means that this group of hackers use their knowledge and
skills for good reasons. Hackers are knowledgeable and
skilled in getting access to secured and protected computer
systems.
– Cracking on the hand is a term that is more fitting to
describe unauthorized access which is done for personal
motives. Cracking is a malicious act of gaining unauthorized
access or accessing the computer systems without
permission with intentions of stealing information, damage
or corrupt data, etc. for financial or personal gains.
jsberrylaw.com, (2020)
Common Types of Computer Crime
• Classification of Hackers
– White Hat Hackers: These hackers do not exploit the
systems’ vulnerability. White Hackers test and/or assess the
capability of the system to secure its data from malicious
hackers. These hackers are also called “Ethical Hackers” and
are paid or hired to test a company’s security system to find
its weakness or loophole. With this, the company can
improve the security of the system.
– Gray Hat Hackers: This group of hackers falls between white
and black hat hackers. Gray hat hackers look for the systems’
weakness and gain unauthorized access. If problems are
found, they may notify the owner of the system and ask for
a small fee for them to fix the problem, however, if the
owner disagrees then they may exploit the systems’
weakness.
jsberrylaw.com, (2020)
Common Types of Computer Crime
• Classification of Hackers
– Black Hat Hackers: These are malicious hackers that
may be considered responsible for creating viruses
and other malware, and other illegal activities like
information theft, cyber espionage, and another
internet-related crime for money or just to prove their
intelligence.
– Green Hat Hackers: These are newbie hackers, usually
they do not yet possess the skills and knowledge of
hackers mentioned above. These hackers dedicate
their time studying and passionately improving their
knowledge and skills in hacking.
jsberrylaw.com, (2020)
Common Types of Computer Crime
• Classification of Hackers
– Hacktivists: They use their knowledge and skills,
and cyberspace to inform people of their cause or
to spread information about corruption, injustices,
and abuses. They sometimes hack websites of
government agencies involved in some political
issues.
– Script Kiddies: These are wannabe expert hackers
but lack the knowledge and skills, discipline, and
dedication to train or educate themselves in the art
of hacking. They just use the scripts or codes and
other tools created by expert hackers.
jsberrylaw.com, (2020)
Common Types of Computer Crime
• Hacking and Cracking are terms that are used
interchangeably because people are confused
which is which.
• But if we are talking about illegal access,
unauthorized access, improper access,
backdoor access, etc., the most fitting word is
cracking.
jsberrylaw.com, (2020)
Common Types of Computer Crime
(Rouse, M, 2020)
(legal-dictionary.thefreedictionary.com, 2020)
Piracy
In computing, the word
piracy usually refers to
Software Piracy. This is an
illegal distribution or
selling of copyrighted
materials and
copyrighted software.
This includes but not
limited to video and audio
such as movies, music,
application software,
graphical images, and
even e-books
Selling and/or
distribution, sharing,
and copying of
copyrighted works are
considered as a crime.
Criminal charges and
penalties are applied
for those caught
selling pirated
materials.
Copyright protects the
rightful owner or the
author’s creative
works as mentioned
above.
A copyright protects
and grants the owner
the exclusive right to
display, distribute,
reproduce copies of
his original work
legally
Common Types of Computer Crime
• Cyberstalking and Harassment
–
jsberrylaw.com, (2020)
nordvpn.com
www.vice.com
patch.com
Cyberstalking is an act of monitoring the victim’s social media
activities and other computer or Internet-related activities. It
may include invasion of privacy, online harassment, and identity
theft. Other perpetrators infect malware the digital equipment
like the computer just to monitor the victim’s computer
activities such as their emails or posts in social media.
Harassment or Online Harassment is an act of harassing,
threatening, and bullying a person over the internet. These
actions would make the victim feel uncomfortable which
may lead to emotional distress such as emotional and/or
psychological stress and depression.
Invasion of Privacy usually happens when the
perpetrator is intruding into the victim’s personal life.
Common Types of Computer Crime
• Cyberstalking and Harassment
– Identity Theft is stealing someone’s identity or pretending to be
someone else which may also lead to online harassment.
Identity theft commonly happens when, for example:
jsberrylaw.com, (2020)
www.duocircle.com
www.thenewfederalist.eu
• A perpetrator or a cyber
crook happened to get
hold of a victim’s credit
card and use it to purchase
goods. The cyber crook
gets the goods and the
victim tends to pay for the
purchases made by the
cyber crook.
•A cyber crook can also use
someone else’s social media
account or create a duplicate
account to post some anti-
government memes, issues,
comments, or doing
something illegal online.
•Furthermore, the perpetrator
may use the victim’s identity
to post and spread fake news.
•Phishing and/or
hacking may result in
identity theft.
Common Types of Computer Crime
• Child Pornography/Abuse
– Child pornography and Child Abuse are very much related. In
fact, in the definition of Child Abuse, one can find out that
engaging a minor or a child in pornography is another way of
abusing a child.
– As stated in justice.gov (2020) child pornography is a form of
child sexual exploitation.
– United States Federal law defines child pornography as any
visual depiction of sexually explicit conduct involving a minor, a
person less than 18 years old.
– Images of child pornography are also referred to as child
sexual abuse images. Federal law in the U.S. prohibits the
production, distribution, importation, reception, or possession
of any image of child pornography.
jsberrylaw.com, (2020)
Common Types of Computer Crime
• Child Pornography/Abuse
– The production of child pornography materials
creates a permanent record of the abuse done to
that child hence when these images are placed
over the Internet and disseminated online, the
victimization of the child continues as long as the
images are posted online.
– Note : Once an image is on the Internet, it is
irretrievable and can continue to circulate
forever.
Common Types of Computer Crime
• Child Pornography/Abuse
– This also leads to lasting psychological damage to the
child, including disruptions in sexual development, self-
image, and developing trusting relationships with others
in the future.
– In a research study conducted by Meng, X., and D’Arcy, C (2016)
it was discussed that there was a significant difference between
the form of childhood experience by men and women. The
study shows that most men experienced physical abuse and
interpersonal violence while women were usually abused
sexually. The study also shows that there is a relationship
between mental disorders and child abuse moderated by
gender. It was found out that significant interactions were found
between being female and sexual abuse for alcohol abuse and
dependence but these may not be true to men.
CYBER CRIME
Computer Crime VS Cybercrime
salzmanattorney.com (n.d.)
• was defined as a criminal act
committed through the use
of a computer
• can be accomplished without
the Internet
Computer
Crime
•usually involves the use of a computer
and the Internet or cyberspace to
commit crime
•cannot be completed without using a
“computer” or any computer-based
technology to access the Internet.
Cybercrime
Common Types of Computer Crime
• Bisson (2019), listed the Five (5) Types of Cybercrimes
and it is listed as follows:
metacompliance.com (2019)
securityintelligence.com
www.cisco.com
i-sight.com
www.inquirer.com/
Phishing
This cybercrime
intends to deceive the
victim using malicious
email attachment,
fake URL, or malicious
website pretending to
be legit to induce the
victim to provide
information the
attacker wants.
Ransomware
Ransomware is a
subset of crimeware
that infects the
computer via
phishing attacks or
an exploit kit
campaign.
Once the infection is
successful, it will
encrypt the victim’s
data then demands
a ransom payment
for the return of
that data.
Malware
Malware can be a
spyware, ransomware,
worm, Trojan horse,
virus, keyloggers, etc.
Malware may destroy
data, disrupt a
computer’s operation,
hack the system,
monitor the Internet
activities, steal
important
information, and can
even remotely control
the computer’s
activities.
Identity Theft
This is the stealing
someone’s identity
or pretending to
be someone else,
and this can lead
to information
theft, online
harassment, and
other crimes the
attacker may want
to commit using
the victim’s
identity.
Scams
Scams always
involve money.
These are
fraudulent
schemes designed
to deceive a victim
so that the
attacker can get
the desired
amount of money
from the victim
The Computer as a Tool to
Commit Crime
Introduction
• Before discussing the topic, we should understand that the
computer was invented to be used as a tool for faster complex
computation not to become a tool to commit a crime.
• If you can still recall, the first programmable general-purpose
digital computer was called ENIAC, short for Electronic Numerical
Integrator and Computing. It was built during World War II to be
used as a tool for obtaining faster computation results and
accurate values for the artillery range table.
• Computer technology has evolved since then and became very
powerful. Until now, computers continue to evolve and become
more powerful compare to their previous versions.
The Computer as a Tool to Commit
Crime -Example
• Social Engineering
– This is defined as a “term used to describe a broad range of malicious
activities through human interaction.” Other definitions discussed that
social engineering may also be done through emails, chats or any means
wherein the attacker could manipulate the victim to commit security
errors.
– It uses “psychological manipulation to trick users into making security
mistakes or giving away sensitive information.”
– Social engineering is defined as “a manipulation technique that exploits
human error to gain private information, access, or valuables. In
cybercrime, these “human hacking” scams tend to lure unsuspecting
users into exposing data, spreading malware infections, or giving access
to restricted systems.
– If you will notice, the two definitions may sound like the definition of
Phishing that is because Phishing s a type of Social Engineering Attack
Emperva.com (2020)
Kaspersky.com (2020),
The Computer as a Tool to Commit
Crime -Example
• According to Teranova.com (2019), social engineering uses
the victim’s heightened emotions to commit the attack. These
heightened emotions are:
Fear Greed
Curiosity Helpfulness
Urgency
The Computer as a Tool to Commit
Crime -Example
• Kaspersky. com (n.d.) further discusses how social engineering works
and listed the steps of the social engineering attack cycle. Here are
the steps as stated in Kaspersky.com.
Prepare by gathering background information
on you or a larger group you are a part of.
Infiltrate by establishing a relationship or
initiating an interaction, started by building
trust.
Exploit the victim’s trust and weakness are
established to advance the attack.
Disengage once the user has taken the
desired action.
The Computer as a Tool to Commit
Crime -Example
• Dumpster Diving
– Based on yourdictionary.com (2020), Dumpster diving is defined
as looking for important electronic information like passwords,
security codes, sensitive documents, etc. in the computer’s
electronic trash can or recycle bins.
– Dumpster diving can also happen in physical trash cans where
important documents or hard copies of important information
has been thrown away.
en.wikipedia.org/wiki/Kevin_Mitnick
Example: At age 12, Mitnick used social engineering and
dumpster diving to bypass the punch card system used in
the Los Angeles bus system. After he convinced a bus
driver to tell him where he could buy his own ticket
punch for "a school project", he was able to ride any bus
in the greater LA area using unused transfer slips he
found in a dumpster next to the bus company garage.
The Computer as a Tool to Commit
Crime -Example
• Cyberterrorism
– Lexico.com (2020), stated that Cyberterrorism is the politically
motivated use of computers and information technology to
cause severe disruption or widespread fear in society.
– Another definition from yourdictionary.com (2020) stated that
Cyberterrorism is the act of inflicting terror through large scale
disruption of networks and computers through cyberspace for
personal gain.
Example: Check out the movie Live
Free or Die Hard staring Bruce Willis.
It perfectly depicts cyberterrorism.
Trailer:
https://www.youtube.com/watch?v=Sv8Uh2Usl
do
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
The Computer as a Tool to Commit
Crime -Example
• Identity Theft
– Identity Theft is stealing someone’s identity or pretending to be someone
else, and this can lead to online harassment and other cybercrimes.
• Internet Gambling
– Others call this as Online Gambling or Internet Gambling. This form of
gambling is illegal for it has no permit/license and therefore the owners do
not pay corresponding taxes.
– Here in the Philippines, we have the Philippine Offshore Gambling
Operators or what they called POGOs. According to esquiremag.ph (2019),
POGOs should be registered and should be issued a license by the Philippine
Amusement Gaming Corporation, without it, POGOs are considered illegal
as well as its workers. Esquiremag.com stated that as of June 9, 2019, there
are 56 licensed POGOs in the country that employ an estimated 100,000 to
250,000 Chinese nationals. Yet the number of illegal POGOs is estimated to
be at around 30.
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
References:
• Berry Law Firm (2020). Common Types of Computer Crimes. Retrieved from https://jsberrylaw.com/blog/common-types-of-computer-
crimes/
• Bisson D. (2019). 5 Types of Cybercrime and How to Protect Against Them. Retrieved from https://www.metacompliance.com/blog/5-
types-of-cybercrime-and-how-to-protect-against-them/
• britannica.com .(2020). Cybercrime. Retrieved from britannica.com/topic/cybercrime
• criminal.findlaw.com .(2019). Computer Crime. Retrieved from https://criminal.findlaw.com/criminal-charges/computer-crime.html
• emperva.com. (2020). Social Engineering. Retrieved from https://www.imperva.com/learn/application-security/social-engineering-attack/
• Ichimura, A. (2019). Are We Playing Our Cards Right? Breaking Down Philippine Offshore Gaming Operators. Retrieved from
https://www.esquiremag.ph/money/industry/philippine-offshore-gaming-operators-what-you-need-to-know-a1926-20190719-lfrm
• Hollingsworth (2018). What Is Internet Theft?. Retrieved from https://www.legalmatch.com/law-library/article/internet-theft.html
• justice.gov (2020). Child Pornography. Retrieved from https://www.justice.gov/criminal-ceos/child-pornography
• kaspersky.com (2020). What is Social Engineering?. Retrieved from https://www.kaspersky.com/resource-center/definitions/what-is-
social-engineering
• legal-dictionary.thefreedictionary.com. (2020). Copyright. Retrieved from https://legal-dictionary.thefreedictionary.com/copyright
• lexico.com (2020). Cyberterrorism. Retrieved from https://www.lexico.com/definition/cyberterrorism
• Meng, X., and D’Arcy, C (2016). Gender moderates the relationship between childhood abuse and internalizing and substance use
disorders later in life: a cross-sectoral analysis. Retrieved from bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-016-1071-7
• Rouse, M. (2020). Piracy. Retrieved from https://whatis.techtarget.com/definition/piracy
• salzmanattorney.com (n.d). Computer Crimes/Cyber Crimes. Retrieved from https://www.salzmanattorney.com/federal-crimes/computer-
crimescyber-crimes/
• teranova.com ( 2019). 9 Examples of Social Engineering Attacks. Retrieved from https://terranovasecurity.com/examples-of-social-
engineering-attacks/
• yourdictionary.com (2020). Dumpster-diving. Retrieved from https://www.yourdictionary.com/dumpster-diving
• yourdictionary.com (2020). Cyberterrorism. Retrieved from https://www.yourdictionary.com/cyberterrorism
•
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
Clarifications?
Assignment
• Enumeration: Visit www.kaspersky.com/resource-center/definitions/what-is-social-engineering, and
enumerate the following.
– What are the different kinds of Phishing?
– What are the two goals of a Social Engineering attacker?
– Give the four examples of Social Engineering attacks listed in Kaspersky.com.
• Discussion/ Explanation: Discuss or explain briefly what is being required. Make sure that your
discussion or explanation is direct to the point (contains the main idea, difference, etc.) and is clear.
Write legibly.
– In a maximum of two sentences, what is the difference between a computer crime and a
cybercrime? ( 2 points)
– In one sentence, explain when a computer crime becomes a cybercrime. (5 points)
– Give at least two types of computer crime and explain how it happens in 6 sentences. (3 points)
– Give at least two types of cybercrime and explain how it happens in 6 sentences. (3 points)
– In two sentences, differentiate hacking from cracking. (2 points)
QUIZ NEXT MEETING
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/

More Related Content

Similar to Technology ComputerCrime presentation.pptx

Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptxssusere71a07
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Chapter 3
Chapter 3Chapter 3
Chapter 3anas_desa
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.pptTanviModi14
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.pptAaishAiman
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 

Similar to Technology ComputerCrime presentation.pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
English in written
English in writtenEnglish in written
English in written
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Technology ComputerCrime presentation.pptx

  • 2. MODULE OUTCOMES: • At the end of each topic, the student must have: – explained the difference between computer crime and cybercrime; – discussed the different types of computer crime and cybercrime; – explained how a computer is used as a tool to commit a crime; – explained how the computer becomes an object of the crime.
  • 3. COMPUTER CRIME • Computer Crime – Computer crime pertains to a criminal act committed through the use of a computer (salzmanattorney.com , n.d.) – Computer crime covers or describes several offenses and that also covers non- computer offenses such as larceny and fraud, except that a computer or the Internet is used in committing the crime (criminal.findlaw.com, 2019)
  • 4. COMPUTER CRIME • Examples of Computer Crime include the following: – Improperly accessing a computer, system, or network; – Modifying, damaging, using, disclosing, copying, or taking programs or data; – Introducing a virus or other contaminant into a computer system; – Using a computer in a scheme to defraud; – Interfering with someone else's computer access or use; – Using encryption in aid of a crime; – Falsifying email source information; and – Stealing an information service from a provider. criminal.findlaw.com, 2019
  • 5. COMPUTER CRIME • Improperly Accessing a Computer, System, or Network – Improper access can also mean unauthorized access. Computer users and network administrators have passwords to access the system for security reasons. – Unauthorized or improper access to a computer, system, or network includes access to a personal computer or a network of computers without acquiring permission or knowledge from the user or administrator. – Unauthorized access may also refers to as Hacking. Since hacking is an act of gaining access to a system without permission or authorization. criminal.findlaw.com, 2019
  • 6. COMPUTER CRIME • Modifying, damaging, using, disclosing, copying, or taking programs or data – Data or information stored in computers or networks, especially by hospitals, business firms, schools, government agencies, and even by private individuals are treated with the utmost confidentiality and are considered private. This simply means that these data and/or information must be protected from all kinds of abuses. This is the main reason for having the Data Privacy Law. – Information Theft on the other hand is defined as the stealing of data and/or information while Software Theft is defined as copying of programs without the permission of the authorized owner. Information and Software Theft are considered as computer crimes and it violates the Data Privacy Law. criminal.findlaw.com, 2019
  • 7. COMPUTER CRIME • Using a computer in a scheme to defraud – Computer Fraud. Computer fraud is defined as an act of deceiving a victim to gain information, money, and other important information through the use of a computer. criminal.findlaw.com, 2019 www.abc2c.com.au
  • 8. COMPUTER CRIME • Interfering with someone else’s computer access or use – Denial of Service Attack or Distributed Denial of Service Attack (DDoS) can interfere with one’s access to Internet services through the client’s computer. DDoS makes an online service unavailable to users by simply interrupting the service temporarily and by doing this, the perpetrator can prevent the user to process and accomplished tasks properly. – The first recorded DoS attack occurred in February 2000, when a 15-year-old Canadian hacker hit Amazon and eBay web servers with this attack. Since then, more and more people have used DoS attacks to disrupt targets. criminal.findlaw.com, 2019 lifars.com, 2020
  • 9. COMPUTER CRIME • DDoS, How it works? criminal.findlaw.com, 2019 lifars.com, 2020
  • 10. COMPUTER CRIME – Hardware Vandalism and Hardware Theft also interferes with someone else’s access and/or use of a computer. • Hardware Vandalism is an act of defacing or destroying a computer and/or digital equipment. • Hardware Theft refers to stealing the physical part of the computer system and/or the digital equipment. criminal.findlaw.com, 2019 texomashomepage.com Olney schools (TEXAS) were closed for a day in 2015 after vandals struck two schools there overnight (Foy, M.2015)
  • 11. COMPUTER CRIME • Using encryption in aid of a crime – Encryption is a process of converting data known as Data Encryption to an unreadable form. This is usually done to secure and protect data and/or information against unauthorized access and use. To make the data readable again it must be decrypted. The sending party uses an algorithm to encrypt the data and the receiving party should have access to what they called a key or password to decrypt the data. – Although encryption is usually used to protect highly classified data against illegal or unauthorized access and use, computer and cybercriminals also use this technique to cover their illegal activities, making them undetectable or at least giving the authority a hard time detecting them, thus, giving them enough time to accomplish their plan. criminal.findlaw.com, 2019 lifars.com, 2020
  • 12. COMPUTER CRIME • Falsifying email source information – Falsification of email source information can refer to Email Spoofing and Phishing. • Email spoofing is an act of making email messages with fake sender addresses, pretending to be legit to gain access to the victim’s information, computer, etc. to carry out a cyber-attack. • Phishing is a deceitful or fraudulent act of getting important information such as user accounts, bank accounts, and credit card numbers from a victim through online messages or websites pretending to be legit. Phishing may lead to Information Theft and Identity Theft. criminal.findlaw.com, 2019 lifars.com, 2020
  • 13. COMPUTER CRIME An example of an Email spoofing. Thoke, O. ,(2019) www.lifewire.com/
  • 14. COMPUTER CRIME An example of an Phishing. resources.infosecinstitute.com
  • 15. COMPUTER CRIME • Stealing an information service from a provider – Internet Theft of Service is the stealing of the Internet service itself as stated by Hollingsworth (2018) and this may be accomplished by physically rerouting Internet cables or by hacking into a wireless Internet wi-fi connection account. – An example of this is when a certain person uses another person’s Internet connection without authorization from the Internet Service Provider even the person subscribing to the Internet allows it. • Mooching or Piggybacking is another common example of Internet Theft of Service, and is also considered as a crime. This happens when the person or the “moocher” can gain access to wi-fi by breaking a subscriber’s Internet password. criminal.findlaw.com, 2019 lifars.com, 2020
  • 16. Common Types of Computer Crime • Hacking/ Cracking – Hacking is an act or practice of gaining unauthorized access to a computer system and the person doing this is called a hacker. But the hacker community disagree with this kind of definition since some of them are Ethical Hacker which means that this group of hackers use their knowledge and skills for good reasons. Hackers are knowledgeable and skilled in getting access to secured and protected computer systems. – Cracking on the hand is a term that is more fitting to describe unauthorized access which is done for personal motives. Cracking is a malicious act of gaining unauthorized access or accessing the computer systems without permission with intentions of stealing information, damage or corrupt data, etc. for financial or personal gains. jsberrylaw.com, (2020)
  • 17. Common Types of Computer Crime • Classification of Hackers – White Hat Hackers: These hackers do not exploit the systems’ vulnerability. White Hackers test and/or assess the capability of the system to secure its data from malicious hackers. These hackers are also called “Ethical Hackers” and are paid or hired to test a company’s security system to find its weakness or loophole. With this, the company can improve the security of the system. – Gray Hat Hackers: This group of hackers falls between white and black hat hackers. Gray hat hackers look for the systems’ weakness and gain unauthorized access. If problems are found, they may notify the owner of the system and ask for a small fee for them to fix the problem, however, if the owner disagrees then they may exploit the systems’ weakness. jsberrylaw.com, (2020)
  • 18. Common Types of Computer Crime • Classification of Hackers – Black Hat Hackers: These are malicious hackers that may be considered responsible for creating viruses and other malware, and other illegal activities like information theft, cyber espionage, and another internet-related crime for money or just to prove their intelligence. – Green Hat Hackers: These are newbie hackers, usually they do not yet possess the skills and knowledge of hackers mentioned above. These hackers dedicate their time studying and passionately improving their knowledge and skills in hacking. jsberrylaw.com, (2020)
  • 19. Common Types of Computer Crime • Classification of Hackers – Hacktivists: They use their knowledge and skills, and cyberspace to inform people of their cause or to spread information about corruption, injustices, and abuses. They sometimes hack websites of government agencies involved in some political issues. – Script Kiddies: These are wannabe expert hackers but lack the knowledge and skills, discipline, and dedication to train or educate themselves in the art of hacking. They just use the scripts or codes and other tools created by expert hackers. jsberrylaw.com, (2020)
  • 20. Common Types of Computer Crime • Hacking and Cracking are terms that are used interchangeably because people are confused which is which. • But if we are talking about illegal access, unauthorized access, improper access, backdoor access, etc., the most fitting word is cracking. jsberrylaw.com, (2020)
  • 21. Common Types of Computer Crime (Rouse, M, 2020) (legal-dictionary.thefreedictionary.com, 2020) Piracy In computing, the word piracy usually refers to Software Piracy. This is an illegal distribution or selling of copyrighted materials and copyrighted software. This includes but not limited to video and audio such as movies, music, application software, graphical images, and even e-books Selling and/or distribution, sharing, and copying of copyrighted works are considered as a crime. Criminal charges and penalties are applied for those caught selling pirated materials. Copyright protects the rightful owner or the author’s creative works as mentioned above. A copyright protects and grants the owner the exclusive right to display, distribute, reproduce copies of his original work legally
  • 22. Common Types of Computer Crime • Cyberstalking and Harassment – jsberrylaw.com, (2020) nordvpn.com www.vice.com patch.com Cyberstalking is an act of monitoring the victim’s social media activities and other computer or Internet-related activities. It may include invasion of privacy, online harassment, and identity theft. Other perpetrators infect malware the digital equipment like the computer just to monitor the victim’s computer activities such as their emails or posts in social media. Harassment or Online Harassment is an act of harassing, threatening, and bullying a person over the internet. These actions would make the victim feel uncomfortable which may lead to emotional distress such as emotional and/or psychological stress and depression. Invasion of Privacy usually happens when the perpetrator is intruding into the victim’s personal life.
  • 23. Common Types of Computer Crime • Cyberstalking and Harassment – Identity Theft is stealing someone’s identity or pretending to be someone else which may also lead to online harassment. Identity theft commonly happens when, for example: jsberrylaw.com, (2020) www.duocircle.com www.thenewfederalist.eu • A perpetrator or a cyber crook happened to get hold of a victim’s credit card and use it to purchase goods. The cyber crook gets the goods and the victim tends to pay for the purchases made by the cyber crook. •A cyber crook can also use someone else’s social media account or create a duplicate account to post some anti- government memes, issues, comments, or doing something illegal online. •Furthermore, the perpetrator may use the victim’s identity to post and spread fake news. •Phishing and/or hacking may result in identity theft.
  • 24. Common Types of Computer Crime • Child Pornography/Abuse – Child pornography and Child Abuse are very much related. In fact, in the definition of Child Abuse, one can find out that engaging a minor or a child in pornography is another way of abusing a child. – As stated in justice.gov (2020) child pornography is a form of child sexual exploitation. – United States Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor, a person less than 18 years old. – Images of child pornography are also referred to as child sexual abuse images. Federal law in the U.S. prohibits the production, distribution, importation, reception, or possession of any image of child pornography. jsberrylaw.com, (2020)
  • 25. Common Types of Computer Crime • Child Pornography/Abuse – The production of child pornography materials creates a permanent record of the abuse done to that child hence when these images are placed over the Internet and disseminated online, the victimization of the child continues as long as the images are posted online. – Note : Once an image is on the Internet, it is irretrievable and can continue to circulate forever.
  • 26. Common Types of Computer Crime • Child Pornography/Abuse – This also leads to lasting psychological damage to the child, including disruptions in sexual development, self- image, and developing trusting relationships with others in the future. – In a research study conducted by Meng, X., and D’Arcy, C (2016) it was discussed that there was a significant difference between the form of childhood experience by men and women. The study shows that most men experienced physical abuse and interpersonal violence while women were usually abused sexually. The study also shows that there is a relationship between mental disorders and child abuse moderated by gender. It was found out that significant interactions were found between being female and sexual abuse for alcohol abuse and dependence but these may not be true to men.
  • 28. Computer Crime VS Cybercrime salzmanattorney.com (n.d.) • was defined as a criminal act committed through the use of a computer • can be accomplished without the Internet Computer Crime •usually involves the use of a computer and the Internet or cyberspace to commit crime •cannot be completed without using a “computer” or any computer-based technology to access the Internet. Cybercrime
  • 29. Common Types of Computer Crime • Bisson (2019), listed the Five (5) Types of Cybercrimes and it is listed as follows: metacompliance.com (2019) securityintelligence.com www.cisco.com i-sight.com www.inquirer.com/ Phishing This cybercrime intends to deceive the victim using malicious email attachment, fake URL, or malicious website pretending to be legit to induce the victim to provide information the attacker wants. Ransomware Ransomware is a subset of crimeware that infects the computer via phishing attacks or an exploit kit campaign. Once the infection is successful, it will encrypt the victim’s data then demands a ransom payment for the return of that data. Malware Malware can be a spyware, ransomware, worm, Trojan horse, virus, keyloggers, etc. Malware may destroy data, disrupt a computer’s operation, hack the system, monitor the Internet activities, steal important information, and can even remotely control the computer’s activities. Identity Theft This is the stealing someone’s identity or pretending to be someone else, and this can lead to information theft, online harassment, and other crimes the attacker may want to commit using the victim’s identity. Scams Scams always involve money. These are fraudulent schemes designed to deceive a victim so that the attacker can get the desired amount of money from the victim
  • 30. The Computer as a Tool to Commit Crime
  • 31. Introduction • Before discussing the topic, we should understand that the computer was invented to be used as a tool for faster complex computation not to become a tool to commit a crime. • If you can still recall, the first programmable general-purpose digital computer was called ENIAC, short for Electronic Numerical Integrator and Computing. It was built during World War II to be used as a tool for obtaining faster computation results and accurate values for the artillery range table. • Computer technology has evolved since then and became very powerful. Until now, computers continue to evolve and become more powerful compare to their previous versions.
  • 32. The Computer as a Tool to Commit Crime -Example • Social Engineering – This is defined as a “term used to describe a broad range of malicious activities through human interaction.” Other definitions discussed that social engineering may also be done through emails, chats or any means wherein the attacker could manipulate the victim to commit security errors. – It uses “psychological manipulation to trick users into making security mistakes or giving away sensitive information.” – Social engineering is defined as “a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. – If you will notice, the two definitions may sound like the definition of Phishing that is because Phishing s a type of Social Engineering Attack Emperva.com (2020) Kaspersky.com (2020),
  • 33. The Computer as a Tool to Commit Crime -Example • According to Teranova.com (2019), social engineering uses the victim’s heightened emotions to commit the attack. These heightened emotions are: Fear Greed Curiosity Helpfulness Urgency
  • 34. The Computer as a Tool to Commit Crime -Example • Kaspersky. com (n.d.) further discusses how social engineering works and listed the steps of the social engineering attack cycle. Here are the steps as stated in Kaspersky.com. Prepare by gathering background information on you or a larger group you are a part of. Infiltrate by establishing a relationship or initiating an interaction, started by building trust. Exploit the victim’s trust and weakness are established to advance the attack. Disengage once the user has taken the desired action.
  • 35. The Computer as a Tool to Commit Crime -Example • Dumpster Diving – Based on yourdictionary.com (2020), Dumpster diving is defined as looking for important electronic information like passwords, security codes, sensitive documents, etc. in the computer’s electronic trash can or recycle bins. – Dumpster diving can also happen in physical trash cans where important documents or hard copies of important information has been thrown away. en.wikipedia.org/wiki/Kevin_Mitnick Example: At age 12, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After he convinced a bus driver to tell him where he could buy his own ticket punch for "a school project", he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage.
  • 36. The Computer as a Tool to Commit Crime -Example • Cyberterrorism – Lexico.com (2020), stated that Cyberterrorism is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society. – Another definition from yourdictionary.com (2020) stated that Cyberterrorism is the act of inflicting terror through large scale disruption of networks and computers through cyberspace for personal gain. Example: Check out the movie Live Free or Die Hard staring Bruce Willis. It perfectly depicts cyberterrorism. Trailer: https://www.youtube.com/watch?v=Sv8Uh2Usl do www.fernbyfilms.com/2008/08/19/movie- review-die-hard-40/
  • 37. The Computer as a Tool to Commit Crime -Example • Identity Theft – Identity Theft is stealing someone’s identity or pretending to be someone else, and this can lead to online harassment and other cybercrimes. • Internet Gambling – Others call this as Online Gambling or Internet Gambling. This form of gambling is illegal for it has no permit/license and therefore the owners do not pay corresponding taxes. – Here in the Philippines, we have the Philippine Offshore Gambling Operators or what they called POGOs. According to esquiremag.ph (2019), POGOs should be registered and should be issued a license by the Philippine Amusement Gaming Corporation, without it, POGOs are considered illegal as well as its workers. Esquiremag.com stated that as of June 9, 2019, there are 56 licensed POGOs in the country that employ an estimated 100,000 to 250,000 Chinese nationals. Yet the number of illegal POGOs is estimated to be at around 30. www.fernbyfilms.com/2008/08/19/movie- review-die-hard-40/
  • 38. References: • Berry Law Firm (2020). Common Types of Computer Crimes. Retrieved from https://jsberrylaw.com/blog/common-types-of-computer- crimes/ • Bisson D. (2019). 5 Types of Cybercrime and How to Protect Against Them. Retrieved from https://www.metacompliance.com/blog/5- types-of-cybercrime-and-how-to-protect-against-them/ • britannica.com .(2020). Cybercrime. Retrieved from britannica.com/topic/cybercrime • criminal.findlaw.com .(2019). Computer Crime. Retrieved from https://criminal.findlaw.com/criminal-charges/computer-crime.html • emperva.com. (2020). Social Engineering. Retrieved from https://www.imperva.com/learn/application-security/social-engineering-attack/ • Ichimura, A. (2019). Are We Playing Our Cards Right? Breaking Down Philippine Offshore Gaming Operators. Retrieved from https://www.esquiremag.ph/money/industry/philippine-offshore-gaming-operators-what-you-need-to-know-a1926-20190719-lfrm • Hollingsworth (2018). What Is Internet Theft?. Retrieved from https://www.legalmatch.com/law-library/article/internet-theft.html • justice.gov (2020). Child Pornography. Retrieved from https://www.justice.gov/criminal-ceos/child-pornography • kaspersky.com (2020). What is Social Engineering?. Retrieved from https://www.kaspersky.com/resource-center/definitions/what-is- social-engineering • legal-dictionary.thefreedictionary.com. (2020). Copyright. Retrieved from https://legal-dictionary.thefreedictionary.com/copyright • lexico.com (2020). Cyberterrorism. Retrieved from https://www.lexico.com/definition/cyberterrorism • Meng, X., and D’Arcy, C (2016). Gender moderates the relationship between childhood abuse and internalizing and substance use disorders later in life: a cross-sectoral analysis. Retrieved from bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-016-1071-7 • Rouse, M. (2020). Piracy. Retrieved from https://whatis.techtarget.com/definition/piracy • salzmanattorney.com (n.d). Computer Crimes/Cyber Crimes. Retrieved from https://www.salzmanattorney.com/federal-crimes/computer- crimescyber-crimes/ • teranova.com ( 2019). 9 Examples of Social Engineering Attacks. Retrieved from https://terranovasecurity.com/examples-of-social- engineering-attacks/ • yourdictionary.com (2020). Dumpster-diving. Retrieved from https://www.yourdictionary.com/dumpster-diving • yourdictionary.com (2020). Cyberterrorism. Retrieved from https://www.yourdictionary.com/cyberterrorism • www.fernbyfilms.com/2008/08/19/movie- review-die-hard-40/
  • 40. Assignment • Enumeration: Visit www.kaspersky.com/resource-center/definitions/what-is-social-engineering, and enumerate the following. – What are the different kinds of Phishing? – What are the two goals of a Social Engineering attacker? – Give the four examples of Social Engineering attacks listed in Kaspersky.com. • Discussion/ Explanation: Discuss or explain briefly what is being required. Make sure that your discussion or explanation is direct to the point (contains the main idea, difference, etc.) and is clear. Write legibly. – In a maximum of two sentences, what is the difference between a computer crime and a cybercrime? ( 2 points) – In one sentence, explain when a computer crime becomes a cybercrime. (5 points) – Give at least two types of computer crime and explain how it happens in 6 sentences. (3 points) – Give at least two types of cybercrime and explain how it happens in 6 sentences. (3 points) – In two sentences, differentiate hacking from cracking. (2 points) QUIZ NEXT MEETING www.fernbyfilms.com/2008/08/19/movie- review-die-hard-40/