Comp 2:
2-1A500
March 20, 2023
10:30 – 11:30 am
INTENDED LEARNING OUTCOMES
Types of Cyber Crimes
At the end of this session, students will be
able to:
1. Determine crimes that can be
committed with the use of the internet;
and
2. Identify the acts that can be categorized
as cybercrime.
TYPES
CYBERCRIMES
WEEK 05
Cybercrime
Cybercrime is a prohibited action against any person using a
computer, its systems, and its online or offline applications.
is a prohibited action against any person using a computer, its systems, and its online or offline
Some of the cyber crimes are the following: Malware
applications. It
or malicious software, botnet, rootkit, worm, trojan, file
infector, backdoor/remote access trojan, ransomware,
scareware, spyware, and adware.
TYPES OF
CYBERCRIMES
Types of Cybercrimes
Malware or malicious softwares
infiltrate and gain control over a
computer system or a mobile device
High-tech to steal valuable information or
crimes damage data. There are many types
of malware, and they can
complement each other when
performing an attack.
Types of Cybercrimes
(short for robot network) is made up
of computers communicating with
each other over the internet. A
Botnet command and control center uses
them to send spam, mount
distributed denial-of-service (DDoS)
attacks, and commit other crimes.
Types of Cybercrimes
is a collection of programs that
enable administrator-level access to
a computer or computer network,
Rootkit thus allowing the attacker to gain
root or privileged access to the
computer and possibly other
machines on the same network..
Types of Cybercrimes
replicates itself over a computer
network and performs malicious
actions without guidance.
Worm
Types of Cybercrimes
poses as or is embedded within a
legitimate program, but it is
designed for malicious purposes
Trojan such as spying, stealing data,
deleting les, expanding a botnet,
and performing DDoS attacks.
Types of Cybercrimes
infects executable files (such as .exe)
by overwriting them or inserting
infected code that disables them.
File infector
Types of Cybercrimes
accesses a computer system or mobile
device remotely. It can be installed by
another piece of malware. It gives almost
Backdoor/remote total control to the attacker, who can
-access trojan perform a wide range of actions including
(RAT) (a) monitoring actions; (b) executing
commands; (c) sending files and
documents back to the attacker; (d)
logging keystrokes; and
(e) taking screenshots.
Types of Cybercrimes
stops users from accessing their devices
and demands that they pay a ransom
through certain online payment methods
Ransomware to regain access. A variant, police
ransomware, uses law enforcement
symbols to lend authority to the ransom
message.
Types of Cybercrimes
is fake anti-virus software that pretends
to scan and find malware/security threats
on a user’s device so that they will pay to
Scareware have it removed.
Types of Cybercrimes
is installed on a computer without its
owner’s knowledge to monitor their
activity and transmit the information to a
Spyware third party.
Types of Cybercrimes
displays advertising banners or pop-ups
that include code to track the user’s
behavior on the internet.
Adware
Summary
• The most common cybercrimes are the following: fraud by
manipulating computer network; unauthorized access to
or modification of data or application; intellectual
property theft that includes software piracy; industrial
spying and access to or theft of computer material; writing
or spreading computer viruses or malware; and digitally
distributing child pornography.
Summary
• By identifying all of the types of cybercrimes and related
activities, we will be able to prevent and counterattack
these cyber criminals. The thought that the internet is a
big source of information could also lead to different
disadvantages.
• Understanding the types of cybercrimes and their damage
or negative outcome to the community will give an idea to
criminology students on how to solve cybercrime using the
same platform or technology the criminal uses.