TYPES
OF
CYBERCRI
ME
Presenter: PLTCOL Alejandro M
Monge II
Child Pornography
It refers to any visual depiction
of sexually explicit conduct
involving a minor.
This can include photographs,
videos, digital images, or other
forms of media.
The production, distribution,
and possession of child
pornography are considered
serious crimes in most
countries and jurisdictions and
are punishable by law.
It's important to note that child
pornography is a form of child
sexual exploitation, and it can
cause significant harm to the
Ransomware
It is a type of malicious
software (malware) that
encrypts a victim's files
or locks their device and
demands a ransom in
exchange for the
decryption key or unlock
code.
The attackers typically
demand payment in
cryptocurrency, making it
difficult to trace.
Ransomware attacks often occur through:
1. Phishing emails or messages
2. Infected software downloads
3. Vulnerabilities in operating systems or application
To protect yourself from ransomware:
1. Regularly back up important files
2. Keep software and operating systems up-to-date
3. Use antivirus software and a firewall
4. Avoid suspicious links and attachments
5. Use strong passwords and enable two-factor authentication
If you're a victim of ransomware, it's essential to:
1. Not pay the ransom, as it encourages attackers and
doesn't guarantee file recovery
2. Report the incident to authorities
3. Seek professional help from cybersecurity
Phishing
It is a type of cybercrime
where attackers send
fake messages, emails,
or texts that appear to be
from a legitimate source,
such as a bank, social
media platform, or online
retailer.
The goal of phishing is to trick victims into:
1. Revealing sensitive information (e.g., passwords, credit card
numbers)
2. Downloading malware or viruses
3. Transferring money or making purchases
Phishing attacks often use:
1. Urgent or threatening language
2. Fake logos or branding
3. Misleading links or attachments
4. Spoofed email addresses or phone numbers
The goal of phishing is to trick victims into:
1. Revealing sensitive information (e.g., passwords, credit card
numbers)
2. Downloading malware or viruses
3. Transferring money or making purchases
Phishing attacks often use:
1. Urgent or threatening language
2. Fake logos or branding
3. Misleading links or attachments
4. Spoofed email addresses or phone numbers
To protect yourself from phishing:
1. Be cautious with links and attachments from unknown
sources
2. Verify the sender's identity and email address
3. Watch for spelling and grammar mistakes
4. Use strong passwords and enable two-factor
authentication
5. Keep software and operating systems up-to-date
Common types of phishing include:
1. Email phishing
2. SMS phishing (smishing)
3. Voice phishing (vishing)
4. Spear phishing (targeted attacks)
Online Harassment
It refers to any
behavior that is
intended to threaten,
intimidate, or harm
someone online.
This can include:
1. Cyberbullying: Sending hurtful or threatening messages, emails,
or comments.
2. Trolling: Posting inflammatory or provocative content to provoke
a reaction.
3. Stalking: Repeatedly contacting or monitoring someone online
without their consent.
4. Hate Speech: Spreading discriminatory or hateful content.
5. Doxxing: Sharing someone's personal information without their
consent.
6. Online Threats: Sending threats of physical harm or violence.
7. Sextortion: Threatening to share intimate images or videos
Online harassment can occur on various
platforms, including:
1. Social media
2. Online forums
3. Gaming communities
4. Email
5. Messaging apps
6. Comment sections
If you're experiencing online harassment:
1. Document evidence
2. Report incidents to platform moderators
3. Block or mute perpetrators
4. Seek support from friends, family, or authorities
5. Consider counseling or mental health resources
Remember, online harassment is never acceptable and
can have serious consequences.
Intellectual Property (IP) Theft
It refers to the
unauthorized use,
reproduction,
distribution, or sale of
someone else's
intellectual property.
This includes:
1. Patents: Inventions, processes, or
designs.
2. Copyrights: Literary, musical, artistic, or
cinematic works.
3. Trademarks: Logos, brand names, or
slogans.
4. Trade Secrets: Confidential business
information, like recipes or software code.
IP theft can occur through:
1. Counterfeiting: Producing fake goods, like counterfeit
watches or handbags.
2. Piracy: Distributing or selling unauthorized copies of
copyrighted works, like music or movies.
3. Plagiarism: Passing off someone else's work as your own.
4. Industrial Espionage: Stealing trade secrets or
confidential business information.
5. Online Infringement: Sharing or using copyrighted
materials without permission on the internet.
IP theft can have serious
consequences, including:
1. Financial losses
2. Damage to reputation
3. Loss of competitive advantage
4. Legal penalties
To protect your intellectual property:
1. Register patents, copyrights, and
trademarks.
2. Use non-disclosure agreements (NDAs)
for trade secrets.
3. Monitor for infringement and take action
if necessary.
4. Educate employees and partners about
IP protection.
Cyber Espionage
It is also known as “cyber
spying”.
It is also the act of
obtaining confidential or
sensitive information from
individuals, organizations,
or governments through
unauthorized access to
computer systems,
networks, or data.
This can include:
1. Hacking into computer systems or
networks
2. Installing malware or spyware
3. Phishing or social engineering
4. Exploiting vulnerabilities in software or
hardware
Cyber espionage can be committed by:
1. Nation-state actors (governments)
2. Organized crime groups
3. Hacktivists
4. Insider threats (employees or contractors)
Motivations for cyber espionage include:
1. Political or strategic advantage
2. Economic gain (theft of intellectual property or trade secrets)
3. Competitive advantage
4. National security interests
To protect against cyber espionage:
1. Implement robust security measures (firewalls,
encryption, access controls)
2. Conduct regular security audits and penetration
testing
3. Educate employees on cybersecurity best practices
4. Use secure communication protocols (HTTPS,
VPNs)
5. Monitor for suspicious activity and incidents
Malware
It is short for "malicious
software".
It also refers to any
software designed to
harm or exploit a
computer system,
network, or mobile
device
Malware can take many forms, including:
1. Viruses: Replicate and spread to other systems.
2. Worms: Self-replicating malware that spreads without user
interaction.
3. Trojans: Disguise themselves as legitimate software to gain
access.
4. Spyware: Steal sensitive information, such as passwords or
credit card numbers.
5. Adware: Display unwanted advertisements.
6. Ransomware: Encrypt files and demand payment for
decryption.
Malware can be spread through:
1. Email attachments or links
2. Infected software downloads
3. Vulnerabilities in operating systems or
applications
4. Infected websites or web ads
5. USB drives or other external devices
To protect against malware:
1. Install and regularly update antivirus software
2. Avoid suspicious emails, links, and downloads
3. Use strong passwords and enable two-factor
authentication
4. Keep operating systems and applications up-to-
date
5. Use a firewall and enable it for all networks
Stay vigilant and take proactive steps to safeguard
your digital assets!
Social Engineering
It is a sneaky way for
scammers to trick people
into giving away sensitive
information or performing
certain actions that
compromise security.
It is also a psychological
manipulation that exploits
human nature, rather than
targeting vulnerabilities in
software or operating
systems.
Think of it like a confidence trick, where the scammer gains your
trust by creating a fake scenario or pretending to be someone
they're not. They might use various tactics, such as:
1. Baiting: Leaving malware-infected devices or storage media in
public places, labeled as something enticing, like "Confidential" or
"Employee Salaries".
2. Scareware: Creating fake alerts or warnings that claim your
device is infected, prompting you to install malware or reveal
sensitive information.
3. Pretexting: Impersonating someone with authority, like a bank or
government official, to gather sensitive information.
4. Phishing: Sending emails or messages that appear to be from a
legitimate source, but are actually designed to trick you into
revealing sensitive information or clicking on malicious links.
The goal of social engineering is to manipulate
people into doing something that compromises
security, like revealing passwords, credit card
numbers, or other sensitive information. It's a
growing concern, and being aware of these tactics is
crucial to protecting yourself and your organization.
Online Child Exploitation
It refers to the abuse or
exploitation of children
through the use of the
internet, social media, or
other digital platforms.
This can take many forms, including:
1. Child Sexual Abuse Material (CSAM): Creating,
distributing, or possessing explicit images or videos of children.
2. Online Grooming: Building relationships with children online
for the purpose of sexual exploitation.
3. Sextortion: Coercing children into providing explicit images
or videos.
4. Cyberbullying: Harassing or intimidating children online.
5. Online Enticement: Persuading children to engage in sexual
activities or meet in person.
6. Child Trafficking: Using online platforms to recruit, transport,
or harbor children for exploitation.
Online child exploitation can occur through
various means, including:
1. Social media platforms
2. Online gaming communities
3. Chat rooms and forums
4. Peer-to-peer file sharing networks
5. Dark web marketplaces
To prevent online child exploitation:
1. Monitor children's online activities
2. Educate children about online safety
3. Use parental control software
4. Report suspicious activity to authorities
5. Support organizations working to combat online
child exploitation
Cyberstalking
It is a form of harassment
that involves using the
internet or other electronic
means to stalk, threaten,
or intimidate someone.
This can include:
1. Sending unwanted or threatening emails, messages, or
comments.
2. Monitoring someone's online activities or tracking their
location.
3. Posting personal or false information about someone online.
4. Creating fake social media profiles or websites to harass or
impersonate someone.
5. Sending unwanted or explicit images or videos.
Cyberstalking can cause emotional distress, fear, and anxiety
for the victim. It's essential to take cyberstalking seriously and
report incidents to authorities.
If you're a victim of cyberstalking:
1. Document all incidents, including dates, times, and
details.
2. Report incidents to local law enforcement or the
FBI's Internet Crime Complaint Center (IC3).
3. Block or report the stalker on social media
platforms.
4. Consider seeking a restraining order.
5. Reach out to a crisis hotline or support organization
for help.
Electronic Fraud
It is also known as “e-
fraud” or “cyberfraud”.
It also refers to the use of
electronic means to
commit fraudulent
activities.
This includes:
1. Phishing: Tricking individuals into revealing sensitive
information.
2. Identity Theft: Stealing personal information to commit
fraud.
3. Online Scams: Deceptive schemes, like fake investment
opportunities or lottery wins.
4. Credit Card Fraud: Unauthorized use of credit card
information.
5. Electronic Funds Transfer (EFT) Fraud: Unauthorized
transfers of funds.
6. Social Engineering: Manipulating individuals into revealing
To protect yourself from electronic fraud:
1. Use strong, unique passwords.
2. Enable two-factor authentication (2FA).
3. Monitor accounts and credit reports regularly.
4. Be cautious with emails, links, and attachments.
5. Use reputable antivirus software.
6. Keep software and operating systems up-to-date.
If you suspect electronic fraud:
1. Report incidents to your bank or credit card
issuer.
2. Contact local law enforcement.
3. File a complaint with the Federal Trade
Commission (FTC).