Assignment 2
Assignment 2
Name of Student
Institutional Affiliation
TYPES OF CYBER CRIME 2
Spams and Phishing. Spamming and phishing are widespread types of cybercrimes. There
is little that can be done to prevent spam and phishing. Spam is an electronic junk mail. According
to Gudkova et al. (2016). Any of our mail inboxes are cluttered with junk mails. Spam mails not
only wastes individuals’ time with unwanted mail but also consumes a lot of network bandwidth.
Phishing is a method where cybercriminals poses a bait so that you take it and disclose the
information they want (Gudkova et al. 2016). The bait can be in the form of an announcement of
lottery which you did not subscribe, business proposal, and anything which is promising cash or
prizes for a small favor or even nothing. For example, you could receive a mail from 1Xbet telling
you that you have won a jackpot and to collect the money you have to answer some questions.
Once you do that, the cybercriminals will get access to your personal information and utilize it.
Spamming and phishing mails are sent by organizations or people you do not know. The US
Cybercrime Center advised people not involve themselves in any form of agreements that promise
Identity-Theft. The term identity-theft is used when an individual claim to be some other
person, with a notion of setting up fraud for financial gain. A cyber-criminal engaged in online
identity-theft may obtain credentials and credit card information of another person (victim) and
use them to impersonate himself as the victim to transfer funds and buy things (Ibrahim et al.
2016). In some scenarios, the cybercriminals pose as another person and take up a huge amount of
unsecured loans which automatically incriminate the victims of identity theft. The very common
source used by criminals to obtain identity information of victims is "data breaches” affecting
federal and government sites. Cybercriminals can also use phishing to steal identity information.
TYPES OF CYBER CRIME 3
To avoid identity Theft, you have to be cautious and exercise common sense when dealing with
by clicking at some advertisements. These malicious codes are usually inserted by cybercriminals
on the websites without the knowledge of the advertising company. In some cases, the criminals
present clean ads for a certain period and then replace it with malverts so that they cannot be
suspected by the website (Pathak, 2016). Cybercriminals display malverts for a while and remove
it from the site after attaining their targets. Malicious ads can appear even on the reputed website;
therefore, precaution is the only key to avoid malvertising. Again, you can prevent Malvertising
by downloading ad-blocker on your computer and making efforts not to click on suspicious ad-
links.
through instant messaging or mails or messages posted to a website (Aggarwal, Arora, & Ghai,
2014). You can protect yourself from Cyberstalking by trying as much as possible to keep your
list to the known, and ensuring that all of the virtual interactive platforms that you regularly use
Reference
Aggarwal, P., Arora, P., & Ghai, R. (2014). Review on cybercrime and security. International
Gudkova, D., Vergelis, M., Demidova, N., & Shcherbakova, T. (2016). Spam and Phishing in Q2
Ibrahim, M., Ramanathan, S., Som, T. K., & Trevathan, M. B. (2016). U.S. Patent No. 9,357,384.
Science, 7(2).