SlideShare a Scribd company logo
1 of 9
Cybercrime
What is it?
Brennan (2010) submits that Cybercrime differs from crime
primarily in
the way it is committed: Criminals use guns, whereas
cybercriminals use
computer technology. Most of the cybercrime we see today
simply
represents the migration of real-world crime into cyberspace.
Cyberspace becomes the tool criminals use to commit old
crimes in new
ways.
Cybercrime
The Emergence of Cybercrime: 1950 - 1990
Computer crime in the 1960`s and 1970`s differed from the
crime we
deal with today. There was no internet; mainframes were not
networked to other computers (Brenner, 2010, p. 10).
Most of these crimes were inside jobs, because the process to
crack the
mainframes was so cumbersome and too technologically-
advanced for
the time.
Cybercrime
The Emergence of Cybercrime: 1950 - 1990
The crimes committed in this era all had one thing in common:
The victims were a company or government agency because
large
entities were the only ones who used mainframe computers.
Using computers to harm individuals do not become a problem
until the
1980`s when the personal computer appeared (Brennan, 2010,
pp. 12-
13).
Cybercrime
The Emergence of Cybercrime: 1950 - 1990
Hacking found its origins at MIT in Cambridge, MA in the
1950s, where
students were able to make the mainframe computers merely “do
things”.
In the 1970`s, MIT hackers would use their knowledge to
conduct
practical jokes and pranks around campus; e.g., elevators,
cookie
monster, etc.
Cybercrime
The Emergence of Cybercrime: 1950 - 1990
As the 1980`s turned into the 1990`s, hacking was changing.
Personal
computers and software—including the software being
developed
specifically to facilitate hacking—were much more common. In
the
1970`s and most of the 1980`s, it was a challenge "just to find a
system
to hack"; by the 1990`s, the Internet was starting to link
everything,
which meant hackers had thousands, and eventually millions, of
targets
(Brennan, 2010, pp. 17-18).
Cybercrime
The Contexts of Cybercrime:
1. Cybercrimes against individuals
2. Cybercrimes against groups
3. Cybercrimes against property
4. Cybercrimes against corporations
5. Cybercrimes against governments
Cybercrime
Cybercrimes Against Individuals:
a. Identity Theft / Fraud
b. Sexual Predation
c. Confidence Tricks / Con-Artists
d. Financial Predation
Cybercrime
Cybercrimes Against Groups:
a. Hacktivists
i. ``Digital Zapatismo``
(more on them later…)
b. System Predators
Cybercrime
Cybercrimes Against Property:
a. Violations of intellectual property rights
i. Napster
ii. Bootleg movies
Cybercrime
Cybercrimes Against Corporations:
a. Denial of Service (DoS)
b. Spamming
c. Unauthorized Access
d. Financial Manipulations
e. Violations of Record-Keeping Laws
Cybercrime
Cybercrimes Against Government(s):
a. Cyber-Terrorism (e.g. ISIS/ISIL)
b. Cyber-War (State-Actors, Gov`t. vs. Gov`t.)
Cybercrime
References
Brenner, S. W. (2010). Cybercrime: criminal threats from
cyberspace.
Santa Barbara, CA: Praeger.
Hayes, R. M. (2010, May 24). Cybercrime and its impact on
new
media and discourse [Scholarly project]. Retrieved January 17,
2017.
Cybercrime
Automated Cybercrime
Not all cybercrimes are physically carried out by a human
being.
Unlike traditional crimes, certain types of cybercrime can be
automated
— they can be carried out by computer code that has been
created and
designed to attack a computer system (Brenner, 2012).
Cybercrime
Automated Cybercrime
Two types of automated cybercrime have so far arisen:
• Malware; the use of computer viruses, worms, and other
programs to
damage or steal data from a system.
• Denial of Service (DoS) attacks; the use of computer code to
take over
“innocent” computers and incorporate them into a cyberarmy
that
then attacks websites and other online systems (Brenner, 2012).
Cybercrime
Automated Cybercrime
Malware is a word created by blending “malicious” and
“software.”
It denotes software that is designed to infiltrate or damage
a computer without the owner’s knowledge and consent
(Brenner,
2012).
Cybercrime
Automated Cybercrime
There are many types of malware, but most people are only
familiar
with two: viruses and worms.
A computer virus is a program that can copy itself and infect
computers,
much as a biological virus infects people (Brenner, 2012).
Cybercrime
Computer Viruses
• Viruses need a host to spread to other computers
• Computer viruses infect program code in one system and use
that
host — plus their capacity for replication — to infect other
systems
(Brenner, 2012).
Cybercrime
Computer Viruses
• Approximately 200 viruses were in circulation by the end of
1990.
• By 2003, the number of viruses in circulation had jumped to
70,000+
• By 2008, viruses numbered over 1,000,000
• By 2010, experts estimated that millions of computer viruses
were in circulation around the globe (Brenner, 2012).
Cybercrime
Computer Worms
• Like a virus, a computer worm is a self-replicating computer
program.
• Unlike a virus, a worm does not need to attach itself to a host
to
spread to other systems.
• A worm uses a network to send copies of itself to other
computers
on that network; worms can therefore replicate on their own,
without any assistance from computer users (Brenner, 2012).
Cybercrime
Viruses,
Worms
& Botnet
Explained

More Related Content

Similar to CybercrimeWhat is itBrennan (2010) submits that Cyber.docx (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Essay On CyberCrime
Essay On CyberCrimeEssay On CyberCrime
Essay On CyberCrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet
InternetInternet
Internet
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 

More from whittemorelucilla

Database reports provide us with the ability to further analyze ou.docx
Database reports provide us with the ability to further analyze ou.docxDatabase reports provide us with the ability to further analyze ou.docx
Database reports provide us with the ability to further analyze ou.docxwhittemorelucilla
 
DataInformationKnowledge1.  Discuss the relationship between.docx
DataInformationKnowledge1.  Discuss the relationship between.docxDataInformationKnowledge1.  Discuss the relationship between.docx
DataInformationKnowledge1.  Discuss the relationship between.docxwhittemorelucilla
 
DataHole 12 Score6757555455555455575775655565656555655656556566643.docx
DataHole 12 Score6757555455555455575775655565656555655656556566643.docxDataHole 12 Score6757555455555455575775655565656555655656556566643.docx
DataHole 12 Score6757555455555455575775655565656555655656556566643.docxwhittemorelucilla
 
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docx
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docxDataDestination PalletsTotal CasesCases redCases whiteCases organi.docx
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docxwhittemorelucilla
 
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docx
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docxDataIllinois Tool WorksConsolidated Statement of Income($ in milli.docx
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docxwhittemorelucilla
 
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docx
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docxDataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docx
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docxwhittemorelucilla
 
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docx
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docxDataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docx
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docxwhittemorelucilla
 
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docx
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docxDataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docx
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docxwhittemorelucilla
 
Database Project CharterBusiness CaseKhalia HartUnive.docx
Database Project CharterBusiness CaseKhalia HartUnive.docxDatabase Project CharterBusiness CaseKhalia HartUnive.docx
Database Project CharterBusiness CaseKhalia HartUnive.docxwhittemorelucilla
 
Databases selected Multiple databases...Full Text (1223 .docx
Databases selected Multiple databases...Full Text (1223  .docxDatabases selected Multiple databases...Full Text (1223  .docx
Databases selected Multiple databases...Full Text (1223 .docxwhittemorelucilla
 
Database SystemsDesign, Implementation, and ManagementCo.docx
Database SystemsDesign, Implementation, and ManagementCo.docxDatabase SystemsDesign, Implementation, and ManagementCo.docx
Database SystemsDesign, Implementation, and ManagementCo.docxwhittemorelucilla
 
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docx
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docxDATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docx
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docxwhittemorelucilla
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxwhittemorelucilla
 
Database Design Mid Term ExamSpring 2020Name ________________.docx
Database Design Mid Term ExamSpring 2020Name ________________.docxDatabase Design Mid Term ExamSpring 2020Name ________________.docx
Database Design Mid Term ExamSpring 2020Name ________________.docxwhittemorelucilla
 
Database Justification MemoCreate a 1-page memo for the .docx
Database Justification MemoCreate a 1-page memo for the .docxDatabase Justification MemoCreate a 1-page memo for the .docx
Database Justification MemoCreate a 1-page memo for the .docxwhittemorelucilla
 
Database Concept Maphttpwikieducator.orgCCNCCCN.docx
Database Concept Maphttpwikieducator.orgCCNCCCN.docxDatabase Concept Maphttpwikieducator.orgCCNCCCN.docx
Database Concept Maphttpwikieducator.orgCCNCCCN.docxwhittemorelucilla
 
Database Dump Script(Details of project in file)Mac1) O.docx
Database Dump Script(Details of project in file)Mac1) O.docxDatabase Dump Script(Details of project in file)Mac1) O.docx
Database Dump Script(Details of project in file)Mac1) O.docxwhittemorelucilla
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docxwhittemorelucilla
 
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docx
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docxDataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docx
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docxwhittemorelucilla
 

More from whittemorelucilla (20)

Database reports provide us with the ability to further analyze ou.docx
Database reports provide us with the ability to further analyze ou.docxDatabase reports provide us with the ability to further analyze ou.docx
Database reports provide us with the ability to further analyze ou.docx
 
DataInformationKnowledge1.  Discuss the relationship between.docx
DataInformationKnowledge1.  Discuss the relationship between.docxDataInformationKnowledge1.  Discuss the relationship between.docx
DataInformationKnowledge1.  Discuss the relationship between.docx
 
DataHole 12 Score6757555455555455575775655565656555655656556566643.docx
DataHole 12 Score6757555455555455575775655565656555655656556566643.docxDataHole 12 Score6757555455555455575775655565656555655656556566643.docx
DataHole 12 Score6757555455555455575775655565656555655656556566643.docx
 
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docx
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docxDataDestination PalletsTotal CasesCases redCases whiteCases organi.docx
DataDestination PalletsTotal CasesCases redCases whiteCases organi.docx
 
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docx
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docxDataIllinois Tool WorksConsolidated Statement of Income($ in milli.docx
DataIllinois Tool WorksConsolidated Statement of Income($ in milli.docx
 
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docx
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docxDataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docx
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGender.docx
 
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docx
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docxDataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docx
DataCity1997 Median Price1997 Change1998 Forecast1993-98 Annualize.docx
 
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docx
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docxDataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docx
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5.docx
 
Database Project CharterBusiness CaseKhalia HartUnive.docx
Database Project CharterBusiness CaseKhalia HartUnive.docxDatabase Project CharterBusiness CaseKhalia HartUnive.docx
Database Project CharterBusiness CaseKhalia HartUnive.docx
 
Databases selected Multiple databases...Full Text (1223 .docx
Databases selected Multiple databases...Full Text (1223  .docxDatabases selected Multiple databases...Full Text (1223  .docx
Databases selected Multiple databases...Full Text (1223 .docx
 
Database SystemsDesign, Implementation, and ManagementCo.docx
Database SystemsDesign, Implementation, and ManagementCo.docxDatabase SystemsDesign, Implementation, and ManagementCo.docx
Database SystemsDesign, Implementation, and ManagementCo.docx
 
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docx
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docxDATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docx
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docx
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
 
Data.docx
Data.docxData.docx
Data.docx
 
Database Design Mid Term ExamSpring 2020Name ________________.docx
Database Design Mid Term ExamSpring 2020Name ________________.docxDatabase Design Mid Term ExamSpring 2020Name ________________.docx
Database Design Mid Term ExamSpring 2020Name ________________.docx
 
Database Justification MemoCreate a 1-page memo for the .docx
Database Justification MemoCreate a 1-page memo for the .docxDatabase Justification MemoCreate a 1-page memo for the .docx
Database Justification MemoCreate a 1-page memo for the .docx
 
Database Concept Maphttpwikieducator.orgCCNCCCN.docx
Database Concept Maphttpwikieducator.orgCCNCCCN.docxDatabase Concept Maphttpwikieducator.orgCCNCCCN.docx
Database Concept Maphttpwikieducator.orgCCNCCCN.docx
 
Database Dump Script(Details of project in file)Mac1) O.docx
Database Dump Script(Details of project in file)Mac1) O.docxDatabase Dump Script(Details of project in file)Mac1) O.docx
Database Dump Script(Details of project in file)Mac1) O.docx
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docx
 
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docx
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docxDataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docx
DataAGEGENDERETHNICMAJORSEMHOUSEGPAHRSNEWSPAPTVHRSSLEEPWEIGHTHEIGH.docx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

CybercrimeWhat is itBrennan (2010) submits that Cyber.docx

  • 1. Cybercrime What is it? Brennan (2010) submits that Cybercrime differs from crime primarily in the way it is committed: Criminals use guns, whereas cybercriminals use computer technology. Most of the cybercrime we see today simply represents the migration of real-world crime into cyberspace. Cyberspace becomes the tool criminals use to commit old crimes in new ways. Cybercrime The Emergence of Cybercrime: 1950 - 1990 Computer crime in the 1960`s and 1970`s differed from the crime we deal with today. There was no internet; mainframes were not networked to other computers (Brenner, 2010, p. 10). Most of these crimes were inside jobs, because the process to crack the mainframes was so cumbersome and too technologically- advanced for the time.
  • 2. Cybercrime The Emergence of Cybercrime: 1950 - 1990 The crimes committed in this era all had one thing in common: The victims were a company or government agency because large entities were the only ones who used mainframe computers. Using computers to harm individuals do not become a problem until the 1980`s when the personal computer appeared (Brennan, 2010, pp. 12- 13). Cybercrime The Emergence of Cybercrime: 1950 - 1990 Hacking found its origins at MIT in Cambridge, MA in the 1950s, where students were able to make the mainframe computers merely “do things”. In the 1970`s, MIT hackers would use their knowledge to conduct practical jokes and pranks around campus; e.g., elevators, cookie monster, etc.
  • 3. Cybercrime The Emergence of Cybercrime: 1950 - 1990 As the 1980`s turned into the 1990`s, hacking was changing. Personal computers and software—including the software being developed specifically to facilitate hacking—were much more common. In the 1970`s and most of the 1980`s, it was a challenge "just to find a system to hack"; by the 1990`s, the Internet was starting to link everything, which meant hackers had thousands, and eventually millions, of targets (Brennan, 2010, pp. 17-18). Cybercrime The Contexts of Cybercrime: 1. Cybercrimes against individuals 2. Cybercrimes against groups 3. Cybercrimes against property 4. Cybercrimes against corporations 5. Cybercrimes against governments
  • 4. Cybercrime Cybercrimes Against Individuals: a. Identity Theft / Fraud b. Sexual Predation c. Confidence Tricks / Con-Artists d. Financial Predation Cybercrime Cybercrimes Against Groups: a. Hacktivists i. ``Digital Zapatismo`` (more on them later…) b. System Predators Cybercrime Cybercrimes Against Property: a. Violations of intellectual property rights i. Napster
  • 5. ii. Bootleg movies Cybercrime Cybercrimes Against Corporations: a. Denial of Service (DoS) b. Spamming c. Unauthorized Access d. Financial Manipulations e. Violations of Record-Keeping Laws Cybercrime Cybercrimes Against Government(s): a. Cyber-Terrorism (e.g. ISIS/ISIL) b. Cyber-War (State-Actors, Gov`t. vs. Gov`t.) Cybercrime References Brenner, S. W. (2010). Cybercrime: criminal threats from
  • 6. cyberspace. Santa Barbara, CA: Praeger. Hayes, R. M. (2010, May 24). Cybercrime and its impact on new media and discourse [Scholarly project]. Retrieved January 17, 2017. Cybercrime Automated Cybercrime Not all cybercrimes are physically carried out by a human being. Unlike traditional crimes, certain types of cybercrime can be automated — they can be carried out by computer code that has been created and designed to attack a computer system (Brenner, 2012). Cybercrime Automated Cybercrime Two types of automated cybercrime have so far arisen: • Malware; the use of computer viruses, worms, and other programs to damage or steal data from a system. • Denial of Service (DoS) attacks; the use of computer code to
  • 7. take over “innocent” computers and incorporate them into a cyberarmy that then attacks websites and other online systems (Brenner, 2012). Cybercrime Automated Cybercrime Malware is a word created by blending “malicious” and “software.” It denotes software that is designed to infiltrate or damage a computer without the owner’s knowledge and consent (Brenner, 2012). Cybercrime Automated Cybercrime There are many types of malware, but most people are only familiar with two: viruses and worms. A computer virus is a program that can copy itself and infect computers, much as a biological virus infects people (Brenner, 2012). Cybercrime
  • 8. Computer Viruses • Viruses need a host to spread to other computers • Computer viruses infect program code in one system and use that host — plus their capacity for replication — to infect other systems (Brenner, 2012). Cybercrime Computer Viruses • Approximately 200 viruses were in circulation by the end of 1990. • By 2003, the number of viruses in circulation had jumped to 70,000+ • By 2008, viruses numbered over 1,000,000 • By 2010, experts estimated that millions of computer viruses were in circulation around the globe (Brenner, 2012). Cybercrime Computer Worms • Like a virus, a computer worm is a self-replicating computer program.
  • 9. • Unlike a virus, a worm does not need to attach itself to a host to spread to other systems. • A worm uses a network to send copies of itself to other computers on that network; worms can therefore replicate on their own, without any assistance from computer users (Brenner, 2012). Cybercrime Viruses, Worms & Botnet Explained