Cybercrime

any crime that involves a computer and a network

Cybercrime is crime that uses a computer and computer network. There are many types of cybercrimes. These include doxxing, hacking, copyright issues, cyberterrorism and fraud.[1] Many countries have laws against many types of online pornography.[2] Some other actions can also be illegal such as cyberbullying, spying, child grooming or hebephilic behavior.[3] Some governments have agencies that deal with computer crimes.[4]

Cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial accounts, credit card or other payment card information.[5] Cybercriminals may also target an individual's private information, as well as corporate data for theft and resale.[6][7]

Cybercrime attacks can begin wherever there is digital data, opportunity and motive. Cybercriminals include everyone from the lone user engaged in cyberbullying to state-sponsored actors, like China's intelligence services. Cybercrimes generally do not occur in a vacuum; they are, in many ways, distributed in nature. That is, cybercriminals typically rely on other actors to complete the crime. This is whether it's the creator of malware using the dark web to sell code, the distributor of illegal pharmaceuticals, using cryptocurrency brokers to hold virtual money in escrow or state threat actors relying on technology subcontractors to steal intellectual property (IP).[8]

Cyber crimes can generally be divided into two categories:[9] change

Crimes that target networks or devices Crimes using devices to participate in criminal activities
Viruses Phishing Emails
Malware Cyberstalking
DoS Attacks Identity theft

References change

  1. Anderson, Ross, et al. "Measuring the cost of cybercrime." The economics of information security and privacy. Springer Berlin Heidelberg, 2013. 265-300.
  2. Urbas, Gregor. "Protecting children from online predators: The use of covert investigation techniques by law enforcement." Journal of Contemporary Criminal Justice 26.4 (2010): 410-425
  3. Edwards, Susan SM. "Cyber-Grooming Young Women for Terrorist Activity: Dominant and Subjugated Explanatory Narratives." Cybercrime, Organized Crime, and Societal Responses. Springer International Publishing, 2017. 23-46.
  4. Levi, Michael, and Matthew Leighton Williams. "Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space." Information Management & Computer Security 21.5 (2013): 420-443
  5. kashif, abbas. "Businesses are increasingly susceptible to cyber-attacks, and Accountants must now consider cyber security as part of their day-to-day work". hmaa.ae. Retrieved 2023-06-05.[permanent dead link]
  6. Williams, Jessica (2020-02-15). "The Effects of Weak Cybersecurity". Retrieved 2021-09-04.
  7. Marlett, Gregory (2021-08-04). "Protect your business from cyberthreats". Technology Solutions. Retrieved 2022-07-15.
  8. Brush, Kate. "How cybercrime works". SearchSecurity. Retrieved 2021-09-04.
  9. says, Sourabh (2018-08-20). "Types of Cybercrime - Panda Security". Panda Security Mediacenter. Retrieved 2019-03-16.

Other page change