Nothing Special   »   [go: up one dir, main page]

Typology of Cyber Crime

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

TYPOLOGY OF CYBER CRIME

Ms. Jessie B Luzon


THE CONVENTION ON CYBER CRIME DISTINGUISHES
BETWEEN FOUR DIFFERENT TYPES OF
OFFENSES

1. Offenses against the confidentiality, integrity and availability


of computer data and systems, such as illegal access, illegal
interception, data interference, system interference, and misuse
of devoice;

2. Computer-related offenses, such as computer-related forgery


and computer- related Fraud

3. Content-related offenses, such as offenses related to child


pornography; And

4. Copyright-related offenses, such as offenses related to


copyright infringements and related rights
ONE APPROACH CAN BE FOUND IN THE CONVENTION ON
CYBERCRIME, WHICH
DISTINGUISHES BETWEEN FOUR DIFFERENT TYPES OF
OFFENSES

1. offenses against the confidentiality, integrity and availability of computer


data and systems;

2. computer-related offenses;

3. content-related offenses;

4. copyright-related offenses
CLASSIFICATION OF COMPUTER CRIMES

 Financial fraud crimes – Financial fraud can be broadly


defined as an intentional act of deception involving
financial transactions for purpose of personal gain. Fraud
is a crime, and is also a civil law violation
 Financial fraud crimes – Financial fraud can be broadly
defined as an intentional act of deception involving
financial transactions for purpose of personal gain. Fraud
is a crime, and is also a civil law violation
Computer fraud – is any dishonest misrepresentation of fact intended to let
another to do or refrain from doing something which causes loss. In this
context, the fraud will result in obtaining a benefit by:

a. Altering in an unauthorized way. This requires little technical expertise


and is a common form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions or using
unauthorized processes;

b. Altering, destroying, suppressing, or stealing output, usually to conceal


unauthorized transactions. This is difficult to detect;

c. Altering or deleting stored data


OTHER FORMS OF FRAUD MAY BE
FACILITATED USING COMPUTER SYSTEMS
 Bank fraud- is the use of potentially illegal means to
obtain money, assets, or other property owned or held by
a financial institution, or to obtain money from
depositors by fraudulently posing as a bank or other
financial institution. For this reason, bank fraud is
sometimes considered a white-collar crime
Carding – is a form of credit card fraud in which a stolen
credit card is used to charge pre-paid cards. Carding
typically involves the holder of the stolen card purchasing
store-branded gift cards, which can then be sold to others
or used to purchase other goods that can be sold for cash
Identity theft – also known as identity fraud, is a crime in
which an imposter obtains key pieces of personally
identifiable information, such as Social Security or driver’s
license numbers, in order to impersonate someone else
Extortion– (also called shakedown, outwrestling and
exaction) is a criminal offense of obtaining money,
property, or services from an individual or
institution ,through coercion
Theft of classified information of Classified information is
sensitive information to which access is restricted by law
or regulation to particular classes of people. A formal
security clearance is required to handle classified
documents or access classified data. The operation of
assigning the level of sensitivity to data is called data
classification
CYBERTERRORISM
-defined as an act of terrorism committed through the
use of cyberspace or computer resources (Parker 1983). As
such, a simple propaganda piece in the Internet that there
will be bomb attacks during the holidays can be considered
cyberterrorism. There are also hacking activities directed
towards individuals, families, organized by groups within
networks, tending to cause fear among people, demonstrate
power, collecting information relevant for ruining peoples’
lives robberies, blackmailing et
CYBER-EXTORTION
-occurs when a website, e-mail server, or computer
system is subjected to or threatened with repeated denial of
service or other attacks by malicious hackers. These
hackers demand money in return for promising to stop the
attacks and to offer “protection”
CYBER WARFARE
 Unauthorized activity among and within the computer
system of the military
COMPUTER AS A TARGET
Crimes that primarily target computer networks or devices
include:
1. Computer viruses
2. Denial-of-service attacks
3. Malware (malicious code)
CATEGORIES OF CYBER CRIME
1. The computer as a target :-using a computer to attacks
other computer, e.g. Hacking, virus/worms attacks, Dos
attack etc.

2. The computer as a weapon :- using a computer to


commit real world crime e.g. cyber terrorism, credit card
fraud and pornography etc.
TYPES OF STALKING
The first type of stalking is when the perpetrator follows an
individual and watches them.

Ex: Maria is being watched while she is walking back to


her home. Her stalker is using surveillance stalking to track
and follow her. With surveillance stalking, the perpetrator
is known to sit outside the home, place of work, school, or
other places that the individual usually go to regularly.
Along with surveillance stalking, there is cyber stalking
Aggravated stalking. Aggravated stalking occurs when the
perpetrator restrains the victim, causes bodily harm to the
victim, or violates an order of protection.

Ex: Maria has not had any of these happen to her, so her
stalker is using surveillance stalking and cyberstalking.
TYPES OF STALKERS
Rejected Stalker- This type of stalker becomes upset when
the friendship or romantic relationship has ended. The
rejected stalker is not only self-centered and jealous but
also over-dependent and persistent.
Resentful Stalker – The resentful stalker feels
humiliated that the relationship has ended and seeks
revenge upon the victim. Resentful stalkers are often
irrationally paranoid and are known to verbally assault
their victims
Predatory Stalker- The predatory stalker seeks power and
sexual gratification. They will not make physical contact
but will use surveillance to track the victim.
Intimacy Seeker– The intimacy-seeking stalker seeks an
intimate and romantic relationship with the victim. When
the stalker is rejected by the victim, he or she will
continually phone the victim, write the victim letters, and
can become jealous and violent if the victim enters into a
relationship with someone else.
Incompetent Suitor- The incompetent suitor stalker usually
has inadequate social skills. They want a relationship with
the victim but do not have the ability to realize he or she is
not meant to be with the victim.
Erotomania and Morbidly Infatuated- This type of stalker
feels that the victim loves them even though they may not
have had any contact with the victim. The stalker is usually
paranoid, prefers suitors in a higher social class, and will
repeatedly approach the victim.
Cyber stalking
is the use of the Internet or other electronic means to
stalk or harass an individual, group, or organization. It may
include false accusations, defamation, slander and libel. It
may also include monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information
that may be used to threaten, embarrass or harass.
TYPES OF CYBERCRIME
 Financial Crimes
 Cyber Pornography

 Online Gambling

 IP Crimes

 Email Spoofing

 Cyber Defamation

 Cyber Staking

 Unauthorized Access

 Theft

 Email Bombing

 Salami Attacks

 Denial of Service (DNS) Attack

 Virus/Worm

 Logic Bombs

 Trojan Attacks

 Web Jacking

 Cyber -Terrorism
CLASSIFICATION OF COMPUTER
CRIMES
 FINANCIAL FRAUD CRIMES
 INTERNET FRAUD

 COMPUTER FRAUD

 OTHER FORMS OF FRAUD


 BANK FRAUD
 CARDING
 IDENTITY THEFT
 EXTORTION
 THEFT OF A CLASSIFIED INFORMATION
METHODOLOGY OF CYBERCRIME
INVESTIGATION
There are many ways for cybercrime to take place, and
investigations tend to start with an IP Address trace,
however that is not necessarily a factual basis upon which
detectives can solve a case. Different types of high-tech
crime may also include elements of low-tech crime, and
vice versa, making cybercrime investigators an
indispensable part of modern law-enforcement.
Methodology of cybercrime detective work is dynamic and
is constantly improving, whether in closed police units, or
in international cooperation framework

You might also like