0% found this document useful (0 votes)
187 views

Assignment 2

The document discusses four main types of cybercrimes: 1) Spamming and phishing, which involve sending unwanted junk emails or posing as legitimate entities to steal personal information; 2) Identity theft, where criminals steal credentials to impersonate and financially benefit from others; 3) Malvertising, the placement of malicious codes on websites through advertisements without the knowledge of advertisers; and 4) Cyberstalking, the harassment of victims through online messages. The document advises caution and security measures like ad blockers to help prevent these cybercrimes.

Uploaded by

LaDonna White
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views

Assignment 2

The document discusses four main types of cybercrimes: 1) Spamming and phishing, which involve sending unwanted junk emails or posing as legitimate entities to steal personal information; 2) Identity theft, where criminals steal credentials to impersonate and financially benefit from others; 3) Malvertising, the placement of malicious codes on websites through advertisements without the knowledge of advertisers; and 4) Cyberstalking, the harassment of victims through online messages. The document advises caution and security measures like ad blockers to help prevent these cybercrimes.

Uploaded by

LaDonna White
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running head: TYPES OF CYBER CRIME 1

Types of Cyber Crime

Name of Student

Institutional Affiliation
TYPES OF CYBER CRIME 2

Types of Cyber Crime

Spams and Phishing. Spamming and phishing are widespread types of cybercrimes. There

is little that can be done to prevent spam and phishing. Spam is an electronic junk mail. According

to Gudkova et al. (2016). Any of our mail inboxes are cluttered with junk mails. Spam mails not

only wastes individuals’ time with unwanted mail but also consumes a lot of network bandwidth.

Phishing is a method where cybercriminals poses a bait so that you take it and disclose the

information they want (Gudkova et al. 2016). The bait can be in the form of an announcement of

lottery which you did not subscribe, business proposal, and anything which is promising cash or

prizes for a small favor or even nothing. For example, you could receive a mail from 1Xbet telling

you that you have won a jackpot and to collect the money you have to answer some questions.

Once you do that, the cybercriminals will get access to your personal information and utilize it.

Spamming and phishing mails are sent by organizations or people you do not know. The US

Cybercrime Center advised people not involve themselves in any form of agreements that promise

something too good to be true.

Identity-Theft. The term identity-theft is used when an individual claim to be some other

person, with a notion of setting up fraud for financial gain. A cyber-criminal engaged in online

identity-theft may obtain credentials and credit card information of another person (victim) and

use them to impersonate himself as the victim to transfer funds and buy things (Ibrahim et al.

2016). In some scenarios, the cybercriminals pose as another person and take up a huge amount of

unsecured loans which automatically incriminate the victims of identity theft. The very common

source used by criminals to obtain identity information of victims is "data breaches” affecting

federal and government sites. Cybercriminals can also use phishing to steal identity information.
TYPES OF CYBER CRIME 3

To avoid identity Theft, you have to be cautious and exercise common sense when dealing with

people either online or offline.

Malvertising. Malvertising is a method whereby website users download malicious code

by clicking at some advertisements. These malicious codes are usually inserted by cybercriminals

on the websites without the knowledge of the advertising company. In some cases, the criminals

present clean ads for a certain period and then replace it with malverts so that they cannot be

suspected by the website (Pathak, 2016). Cybercriminals display malverts for a while and remove

it from the site after attaining their targets. Malicious ads can appear even on the reputed website;

therefore, precaution is the only key to avoid malvertising. Again, you can prevent Malvertising

by downloading ad-blocker on your computer and making efforts not to click on suspicious ad-

links.

Cyberstalking. Cyberstalking is a crime in which a cyber-criminal harasses a victim

through instant messaging or mails or messages posted to a website (Aggarwal, Arora, & Ghai,

2014). You can protect yourself from Cyberstalking by trying as much as possible to keep your

list to the known, and ensuring that all of the virtual interactive platforms that you regularly use

have a high level of security.


TYPES OF CYBER CRIME 4

Reference

Aggarwal, P., Arora, P., & Ghai, R. (2014). Review on cybercrime and security. International

Journal of Research in Engineering and Applied Sciences, 2(1), 48-51.

Gudkova, D., Vergelis, M., Demidova, N., & Shcherbakova, T. (2016). Spam and Phishing in Q2

2016. Kaspersky Lab, 18.

Ibrahim, M., Ramanathan, S., Som, T. K., & Trevathan, M. B. (2016). U.S. Patent No. 9,357,384.

Washington, DC: U.S. Patent and Trademark Office.

Pathak, P. B. (2016). Malware a Growing Cybercrime Threat: Understanding and Combating

Malvertising Attacks. International Journal of Advanced Research in Computer

Science, 7(2).

You might also like