Cybercrime: Definition and Types

Cybercrime refers to any illegal activity that is committed using the internet or other forms of computer technology, or with the purpose of influencing the functioning of computers and computer systems.

Cybercrime is a growing concern as more and more of our personal and professional lives are conducted online, and as technology becomes more sophisticated, the methods used by cybercriminals are becoming increasingly advanced as well. As the interconnectedness of devices and reliance on the internet increases, cybercrime poses a threat not only to individuals and businesses but also to entire communities and critical infrastructure.

TYPES OF CYBERCRIMES

Cybercrimes can include a broad range of potentially illegal activities such as hacking into computer systems, stealing sensitive information like credit card numbers and personal data, distributing malware, cyberstalking, cyberbullying, or even using social media to commit fraud. Broadly, it can be divided into the following three categories:

a) Computer as a Target

This category includes the cybercrimes that target a computer and the data stored on it by gaining unauthorized and illegal access to computer systems and data stored on them. One of the most common targets of cybercrime is personal computers, as they often contain sensitive information such as financial data and personal identification. Businesses also face a significant risk of cybercrime, as their computer systems may contain valuable trade secrets or customer information. Furthermore, cybercriminals may target government agencies, critical infrastructure, and other organizations that play a vital role in society. These crimes can have severe consequences and can cause significant financial loss and disruption of operations.

Some of the most common methods by which a computer can be targeted include:

  1. Virus (Vital Information Resource Under Siege)

    A computer virus is a type of malicious software that is designed to replicate itself and spread to other computers. Once a computer is infected with a virus, it can cause a wide range of problems, including slowing down the performance of the computer, corrupting or deleting files, and stealing personal information. They are spread via infected external devices like CDs and pen drives, e-mail attachments, visiting infected websites, downloading infected files, etc.

  2. Trojan Horses

    A Trojan horse is a type of malicious software that disguises itself as a legitimate or seemingly harmless program or files such as games or screensavers. The name ‘Trojan horse’ comes from the story of the Trojan War in Greek mythology, in which the Greeks gave a large wooden horse to the Trojans as a gift, but it was actually filled with soldiers who then attacked the city. Similarly, a Trojan horse disguises itself as something harmless, but once activated, it can gain unauthorized access to a computer system or network, steal personal information, or allow an attacker to control the infected computer remotely.

  3. Worms

    A computer worm is a type of malware that is designed to replicate itself and spread to other computers on a network. Unlike a virus, which requires a host program or file to replicate, a worm can spread on its own. Once a worm has infected one computer, it has the ability to replicate itself and spread to other computers that are connected to the same network as the infected computer. This can happen very quickly and can infect a large number of computers on the same network, making it a significant problem for businesses and organizations that rely on networks to connect their computers. Worms can cause a wide range of problems, including slowing down the performance of the computer, consuming bandwidth, and even allowing the attacker to gain unauthorized access and steal personal information or use the infected computer as a launchpad for other attacks.

  4. Logic Bombs

    A logic bomb is computer instructions coded in a program that triggers the execution of a malicious act, when certain conditions are met. It is also called ‘slag code’ and is programmed in the software of an application or operating system. Logic bombs can be hidden in seemingly legitimate software, such as a spreadsheet or a word processing program, and can be triggered on a specific date or time, or when a specific file or program is opened or deleted. The actions can be destructive, such as deleting files or causing a computer to crash, or they can be used to steal sensitive information or disrupt operations.

  5. Hacking

    Hacking is the practice of using technical skills to gain unauthorized access to computer systems, networks, or personal devices. Hackers use a variety of techniques, such as exploiting vulnerabilities in software or using social engineering tactics, to gain access to sensitive information or disrupt operations. Regardless of the intentions of the hacker, hacking can have severe consequences, such as financial loss, theft of personal information, etc. It is important to have good security practices in place, such as keeping software and operating systems up to date, using strong passwords, and monitoring network activity, to protect against hacking attempts.

    📌 Read more about Hacking 📌 Read more about Ethical Hacking

  6. Spoofing

    Spoofing refers to the practice of disguising oneself as someone else or a different entity to gain unauthorized access or perform malicious actions. There are several types of spoofing:

    1. IP spoofing: This type of spoofing involves disguising the sender's IP address to hide the identity of the sender or to impersonate another device on a network. This can be used to gain unauthorized access to a computer system or network, launch a denial of service attack, or steal sensitive information.

    2. Email spoofing: This involves disguising the sender's email address to hide the identity of the sender or to impersonate someone else. This can be used to spread malware, steal sensitive information, or launch phishing attacks.

    3. DNS spoofing: This type of spoofing involves manipulating the Domain Name System (DNS) to redirect users to a fake website or server. This can be used to steal sensitive information, launch phishing attacks, or spread malware.

    4. ARP spoofing: This is a type of attack in which an attacker sends fake (or "spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network (LAN). This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network, allowing the attacker to intercept network traffic.

    It is important to be cautious of unexpected messages or calls and to use security measures such as firewalls and intrusion detection systems to protect against spoofing attempts.

b) Computer as a Primary Tool

This category includes cybercrimes in which a computer is used for committing an offense such as child pornography, gambling, cyberbullying, stealing money by illegal money transfer, etc. Some of the crimes are discussed below:

  1. Illegal Pornography

    Illegal pornography refers to any form of pornographic material that is prohibited by law. It is illegal to produce, distribute, or possess child pornography. Child pornography is defined as any visual depiction of sexually explicit conduct involving a minor. This can include photographs, videos, and computer-generated images, as well as any other type of media. It is also illegal to produce, distribute, or possess other forms of pornography, such as bestiality, rape, and other forms of non-consensual sexual acts. These types of materials are considered to be harmful and offensive and are prohibited by law.

    It's important to note that laws regarding pornography vary by country, state, or province, so what may be considered illegal in one place might not be in another. It is important to be aware of the laws in your area and to avoid viewing, sharing, or possessing any illegal pornographic material.

  2. Cyberbullying

    Cyberbullying can include actions such as sending threatening or abusive messages, spreading rumors or false information, sharing embarrassing or private photos or videos, creating fake profiles or websites, and derogatory comments focusing on gender, race, religion, nationality, sexual orientation, etc. This often occurs in chat rooms, social media sites, through news groups, and by sending hate e-mails.

    Cyberbullying can happen to anyone, but it is most commonly directed at children and teens. It is important for parents, educators, and others to be aware of the signs of cyberbullying and to take steps to prevent it, such as educating children on how to use technology safely, monitoring their online activities, and encouraging them to speak up if they experience cyberbullying.

  3. Spam

    Spam is the sending of unwanted or unsolicited electronic messages, typically sent in bulk to a large number of recipients. Spam is usually sent through email, but can also be sent through text messages, instant messaging, and social media. The messages can include anything from advertisements for products or services to phishing scams or malware. Spam can clog up email inboxes, making it difficult to find legitimate messages, and can also contain malware, viruses, or phishing attempts that can compromise the recipient's computer or steal personal information.

  4. Phishing

    Phishing is a type of cybercrime in which an attacker attempts to trick individuals into giving away sensitive information, such as passwords, credit card numbers, or other personal information, by disguising themselves as a trustworthy entity. This is often done through email, but can also be done through phone calls or text messages.

    Phishing emails often include a sense of urgency or a threat to prompt the recipient to take immediate action, such as clicking on a link or downloading an attachment. The link or attachment may lead to a fake website or a website that has been compromised and can be used to steal personal information. To protect against phishing, it is important to be cautious of unexpected messages or phone calls, be cautious of links or attachments in messages from unknown senders, and use anti-virus software to protect against malware and other malicious software.

  5. Intellectual Property Theft

    Intellectual property theft refers to the unauthorized use or reproduction of proprietary information, such as patents, trademarks, copyrights, and trade secrets. This can include activities such as:

    a) Reproducing, distributing, and selling copyrighted material without permission (such as software, music, movies, and the content of this website 😒)

    b) Using a trademarked name or logo without authorization or using someone else's patented invention without permission

    c) Making and distributing fake copies of trademarked goods i.e. counterfeiting

    d) Stealing confidential information that is used by a company to gain a competitive advantage.

    Companies and individuals need to protect their intellectual property by using legal means such as patents, trademarks, and copyrights, and also to be vigilant about monitoring and protecting their intellectual property from theft.

  6. Denial of Service Attacks (DoS)

    A Denial of Service (DoS) attack is designed to make a computer or network resource unavailable to its intended users. There are several types of DoS attacks:

    a) Flooding attacks: This type of attack involves overwhelming a targeted system or network with a large amount of traffic, such as a flood of network packets, to consume its resources and prevent legitimate traffic from reaching its destination.

    b) Amplification attacks: This type of attack involves using a third-party system, such as a publicly accessible server, to amplify the amount of traffic sent to a targeted system or network.

    c) Application-layer attacks: This type of attack involves overwhelming a targeted system or network by exploiting vulnerabilities in the application layer, such as a website or web application.

    d) Distributed Denial of Service (DDoS) attack: This type of attack involves using a network of compromised systems, known as botnets, to launch a coordinated attack against a targeted system or network.

    A DoS attack can cause a wide range of problems, such as slowing down the performance of the targeted system or network, consuming bandwidth, and making the system or network unavailable to legitimate users. It's important to have security measures in place such as firewalls, and intrusion detection systems, and to have an incident response plan to detect and mitigate the effects of DoS attacks.

c) Computer as a Secondary Tool

This category includes cybercrimes in which a computer is used by criminals to facilitate their criminal activities such as processing data quickly to facilitate the commission of crime or distribution of illegal goods and services, etc. Some common examples are:

  1. Organized crime: Criminal organizations can use computers to coordinate and plan their activities, as well as to communicate and share information with one another.

  2. Distribution of illegal goods and services: Criminals can use computers to distribute illegal goods and services such as drugs, weapons, and stolen credit card numbers.

  3. Facilitation of illegal gambling and money laundering: Criminals can use computers to facilitate illegal gambling and money laundering through online casinos, sports betting, and other illegal activities.

  4. Facilitation of human trafficking: Criminals can use computers to facilitate human trafficking by arranging transportation, housing, and communication.

 

Looking for a topic? 👀

Previous
Previous

Classification of Computers

Next
Next

Hacking and Hackers