The following checklist and advice against cyber crime had been created out of a collection of eperiences and epert advice. It provides a good measure of what needs to be done to fight cyber crime and some proactive measures needed to stay protected. Our checklist is based on best practices from the 2016 Internet Security Threat Report (ISTR).
Types of Cyber Crimes
Every crime committed over the Internet it is referred to as a cyber crime. There are several forms these crime take. Below are a list of the most common:
Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
Theft: This involves the violation of copyrights and downloading of music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.
Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. Sometimes, they combine offline stalking along with cyber stalking to make the victims’ lives more miserable.
Identity Theft: In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name.
Malicious Software: These involve the use of Internet-based software or programs to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
Child soliciting and Abuse: In this case, criminals solicit minors via chat rooms for the purpose of child pornography.
No comments:
Post a Comment