Cybercrime Assignment
Cybercrime Assignment
1. Concept of Cybercrime
Cybercrime refers to illegal activities using computers, networks, or digital devices. It includes hacking,
fraud, identity theft, cyberstalking, and cyberterrorism. Unlike traditional crimes, cybercrimes are often
global and hard to trace.
2.1 Cyber
The term "Cyber" refers to anything related to computers, digital technology, and the internet. It
encompasses online networks, communication systems, and digital interactions.
2.2 Cyberspace
Cyberspace is the virtual environment created by computer networks and the internet, where people,
businesses, and governments interact. It includes websites, social media, cloud storage, online
banking, and digital communications.
2.3 Cybercrime
Cybercrime refers to illegal activities conducted in cyberspace using computers, networks, or digital
devices. Examples include hacking, identity theft, cyber fraud, ransomware attacks, and
cyberterrorism. Cybercrimes can target individuals, organizations, or governments.
Cybercrime can be classified into three main categories based on the target and intent of the crime:
These crimes directly affect individuals by compromising their privacy, security, or finances.
Fake News & Misinformation – Spreading false information to manipulate public opinion.
Characteristics of Cybercrime
1. Anonymity – Cybercriminals can hide their identity using VPNs, encryption, and fake accounts.
3. Automation & Speed – Attacks can be executed rapidly and on a large scale using automated
tools.
4. Low Cost, High Impact – Cybercrimes require minimal resources but can cause massive
financial and data losses.
6. Constantly Evolving – Cyber threats continuously adapt with new technology and hacking
techniques.
7. Exploitation of Human Weakness – Many cybercrimes use phishing and social engineering to
manipulate victims.
8. Target Diversity – Individuals, businesses, and governments can all be victims of cybercrime.
9. Remote Execution – Cybercriminals can launch attacks from anywhere in the world without
physical presence.
10. Use of Advanced Technologies – AI, bots, and malware enhance the effectiveness of
cyberattacks.
Types of Cybercriminals
Cybercriminals vary based on their motives, skills, and targets. Here are the main types:
o Black Hat Hackers – Malicious hackers who steal data or cause damage.
2. Cyber Terrorists – Attack digital systems to cause fear, disruption, or damage to national
security.
3. Hacktivists – Use hacking to promote political or social causes (e.g., leaking government
secrets).
4. Scammers & Fraudsters – Conduct online fraud, phishing, fake lotteries, and financial scams.
8. Insider Threats – Employees or ex-employees who misuse access to steal or leak sensitive
information.
9. Dark Web Criminals – Operate illegal marketplaces for drugs, weapons, and stolen data.
10. State-Sponsored Hackers – Work for governments to conduct cyber espionage and cyber
warfare.
Despite strict cyber laws, cybercrime continues due to several key reasons:
1. Lack of Awareness – Many people and businesses do not follow basic cybersecurity practices,
making them easy targets.
2. Weak Law Enforcement in Some Regions – Some countries lack the resources, technology, or
legal framework to track and prosecute cybercriminals effectively.
3. Cross-Border Jurisdiction Issues – Cybercrimes often originate from different countries, making
legal enforcement complex and slow.
4. Anonymity & Untraceable Transactions – Criminals use encryption, VPNs, and cryptocurrencies
to hide their identity and financial activities.
5. Rapid Evolution of Technology – Cybercriminals constantly find new vulnerabilities, and laws
struggle to keep up with technological advancements.
6. High Profitability – Crimes like ransomware, fraud, and data theft generate massive profits
with relatively low investment and risk.
7. Dark Web & Underground Markets – Illegal marketplaces facilitate the sale of stolen data,
hacking tools, and cybercrime services.
8. Insider Threats & Negligence – Employees and insiders may intentionally or unintentionally
cause data breaches.
9. Cyber Warfare & State-Sponsored Attacks – Some governments support hacking for espionage,
disruption, or political gain.
10. Overburdened Legal Systems – Courts and law enforcement agencies may be overwhelmed
with cybercrime cases, leading to delays in justice.
2. Phishing – Deceptive emails, messages, or websites used to steal sensitive information like
passwords and credit card details.
3. Identity Theft – Using stolen personal information for fraud, such as opening bank accounts or
making unauthorized transactions.
4. Ransomware Attacks – Malicious software that locks files or systems and demands payment
for their release.
5. Online Scams & Fraud – Fake lotteries, investment frauds, and e-commerce scams to steal
money from victims.
6. Cyberstalking & Harassment – Online threats, blackmail, or harassment through social media,
emails, or messaging platforms.
8. Malware Attacks – Viruses, worms, spyware, and Trojans used to damage or steal data from
systems.
9. Data Breaches – Unauthorized access to confidential data, often leading to financial or
reputational damage.
In the Philippines, cybercrime has become a significant concern, with various forms affecting
individuals, businesses, and government institutions. According to the Philippine National Police
(PNP), swindling or fraudulent schemes aimed at deceiving individuals for personal gain are the most
prevalent, accounting for approximately 15,000 incidents.
Phishing attacks are also widespread, where malicious actors send deceptive emails or messages to
trick recipients into revealing sensitive information, such as passwords or financial details.
Other common cybercrimes in the country include identity theft, where personal information is stolen
and misused; hacking, involving unauthorized access to computer systems; and online harassment or
cyberstalking, which entails using digital platforms to intimidate or threaten individuals.
The Philippine government has enacted the Cybercrime Prevention Act of 2012 (Republic Act No.
10175) to address these issues, defining offenses such as illegal access, system interference, and data
interference.
Despite these legal measures, cybercrime remains a persistent challenge, necessitating continuous
efforts in public awareness, cybersecurity enhancements, and law enforcement to mitigate its impact.