Announcement

Collapse
No announcement yet.

Generic Examples of Cybercrime

Collapse
X
 
  • Time
  • Show
Clear All
new posts

  • Generic Examples of Cybercrime

    Stealing passwords and usernames, or using vulnerabilities in a system to gain access, falls under the category of theft of access and the stealing of services and resources that the party would not otherwise be gives access to. In some cases stealing credentials but not using them is enough to have comitted a cybercrime. In a few states even sharing usernames and passwords with a friend or family member is a crime.

    Network intrsions are a form of digital trespassing where a party goes someplace that they would not otherwise have access to. Access to any system or group of systems to which a party would not normally be given access is considered a violation of the network and therefore a cybercrime. In some cases the actual intrusion may not even involve hacking tools; the very act of logging into a guest account may be sufficient to be considered an intrusion.

    Social engineering is both the simplest and the most complex form of hacking or exploiting a system by going after its weakest point, the human element. On the one hand, this is easy to attempt because the human being is many times the most accessible component of a system and the simplest to interact with. One the other hand, it can be extremely difficult to read bot the spoken and unspoken cues to get the information that may be usefol to the attacker.

    Posting and/or transmitting illegal material has gotten to be a difficult problem to solve and deal with over the last decade. WIth the increase of the use of social media and other Internet-related services, illegal material can spread from one corner of the globe to the other in a very short period of time.

    Fraud is the deception of another party or parties to elicit information or access typically for financial gain or to cause damage.

    Software piracy is the posession, dublication, or distribution of software in violation of a license agreement, or the act of removing copy protection or other license-enforcing mechanisms. Again this has become a massive problem with the rise of file-sharing services and other mechanisms designed to ease sharing and distribution; in many cases the systems are used for distribution without the system owner's consent.

    Dumpster diving is the oldest and simplest way to gather material that has been discarded or left in unsecured or unguarded receptacles. Often, discarded data can be pieced together to reconstruct sensitive information.

    Malicious code refer to items such as viruses, works, spyware, adware, rootkits, and other types of malware. This crime covers any type of software deliberatly written to wreak havoc and destruction or disruption.

    Unauthorized destruction or alteration of information includes modifying, destroying, or tampering with information without permission.

    Embezzlement is a form of financial fraud that involves theft or redirection of funds as a result of violating a position of trust. The crime has been made much easier through the use of modern digital means.

    Data-diddling is the unauthroized modification of information to cover up activities.

    Denial-of-service and distributed denial-of-service attacks are ways to overload a system's resources so it cannot provide the required services to legitimate users.
    Certified Security Geek
Working...
X
😀
🥰
🤢
😎
😡
👍
👎