0% found this document useful (0 votes)
4 views

Cybercrime Assignment

Uploaded by

jcalanoc203
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Cybercrime Assignment

Uploaded by

jcalanoc203
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cybercrime: Concept & Nature

1. Concept of Cybercrime

Cybercrime refers to illegal activities using computers, networks, or digital devices. It includes hacking,
fraud, identity theft, cyberstalking, and cyberterrorism. Unlike traditional crimes, cybercrimes are often
global and hard to trace.

1.2 Nature of Cybercrime

 Crimes Against Individuals – Identity theft, cyberbullying, phishing.

 Crimes Against Organizations – Hacking, ransomware, DoS attacks.

 Crimes Against Governments – Cyberterrorism, espionage, infrastructure attacks.

2. What is Cyber, Cyber Space, and Cyber Crime?

2.1 Cyber

The term "Cyber" refers to anything related to computers, digital technology, and the internet. It
encompasses online networks, communication systems, and digital interactions.

2.2 Cyberspace

Cyberspace is the virtual environment created by computer networks and the internet, where people,
businesses, and governments interact. It includes websites, social media, cloud storage, online
banking, and digital communications.

2.3 Cybercrime

Cybercrime refers to illegal activities conducted in cyberspace using computers, networks, or digital
devices. Examples include hacking, identity theft, cyber fraud, ransomware attacks, and
cyberterrorism. Cybercrimes can target individuals, organizations, or governments.

3. Broad Categories of Cyber Crime?

Broad Categories of Cybercrime

Cybercrime can be classified into three main categories based on the target and intent of the crime:

1. Crimes Against Individuals

These crimes directly affect individuals by compromising their privacy, security, or finances.

 Identity Theft – Stealing personal information for fraud.

 Cyberstalking & Harassment – Online threats, bullying, and intimidation.

 Phishing & Scams – Deceiving users to steal passwords or money.

 Online Fraud – Fake e-commerce, investment fraud, and lottery scams.


2. Crimes Against Organizations

These crimes disrupt businesses, corporations, and institutions.

 Hacking & Data Breaches – Unauthorized access to systems or sensitive data.

 Ransomware Attacks – Locking data for ransom payments.

 Denial-of-Service (DoS) Attacks – Overloading networks to shut them down.

 Intellectual Property Theft – Piracy, software counterfeiting, and trademark violations.

3. Crimes Against Governments & Nations

These crimes pose threats to national security and public systems.

 Cyberterrorism – Digital attacks on critical infrastructure.

 Espionage & Surveillance – Spying on government agencies and corporations.

 Fake News & Misinformation – Spreading false information to manipulate public opinion.

 Election Interference – Cyber activities affecting electoral processes.

4. Characteristics of Cyber Crime?

Characteristics of Cybercrime

1. Anonymity – Cybercriminals can hide their identity using VPNs, encryption, and fake accounts.

2. Borderless Nature – Cybercrimes operate across international boundaries, making legal


enforcement difficult.

3. Automation & Speed – Attacks can be executed rapidly and on a large scale using automated
tools.

4. Low Cost, High Impact – Cybercrimes require minimal resources but can cause massive
financial and data losses.

5. Difficult to Trace – Criminals use sophisticated methods to erase digital footprints.

6. Constantly Evolving – Cyber threats continuously adapt with new technology and hacking
techniques.

7. Exploitation of Human Weakness – Many cybercrimes use phishing and social engineering to
manipulate victims.

8. Target Diversity – Individuals, businesses, and governments can all be victims of cybercrime.

9. Remote Execution – Cybercriminals can launch attacks from anywhere in the world without
physical presence.
10. Use of Advanced Technologies – AI, bots, and malware enhance the effectiveness of
cyberattacks.

5. Types of Cyber Criminal?

Types of Cybercriminals

Cybercriminals vary based on their motives, skills, and targets. Here are the main types:

1. Hackers – Gain unauthorized access to computer systems.

o White Hat Hackers – Ethical hackers who help improve security.

o Black Hat Hackers – Malicious hackers who steal data or cause damage.

o Grey Hat Hackers – Operate in between legal and illegal hacking.

2. Cyber Terrorists – Attack digital systems to cause fear, disruption, or damage to national
security.

3. Hacktivists – Use hacking to promote political or social causes (e.g., leaking government
secrets).

4. Scammers & Fraudsters – Conduct online fraud, phishing, fake lotteries, and financial scams.

5. Identity Thieves – Steal personal data to commit fraud or financial crimes.

6. Cyberstalkers & Harassers – Engage in online harassment, cyberbullying, or stalking


individuals.

7. Malware Developers – Create and distribute viruses, ransomware, and spyware.

8. Insider Threats – Employees or ex-employees who misuse access to steal or leak sensitive
information.

9. Dark Web Criminals – Operate illegal marketplaces for drugs, weapons, and stolen data.

10. State-Sponsored Hackers – Work for governments to conduct cyber espionage and cyber
warfare.

6. Reason for Existence of Cyber Crime Despite Anti-Cyber Law?

Despite strict cyber laws, cybercrime continues due to several key reasons:

1. Lack of Awareness – Many people and businesses do not follow basic cybersecurity practices,
making them easy targets.

2. Weak Law Enforcement in Some Regions – Some countries lack the resources, technology, or
legal framework to track and prosecute cybercriminals effectively.
3. Cross-Border Jurisdiction Issues – Cybercrimes often originate from different countries, making
legal enforcement complex and slow.

4. Anonymity & Untraceable Transactions – Criminals use encryption, VPNs, and cryptocurrencies
to hide their identity and financial activities.

5. Rapid Evolution of Technology – Cybercriminals constantly find new vulnerabilities, and laws
struggle to keep up with technological advancements.

6. High Profitability – Crimes like ransomware, fraud, and data theft generate massive profits
with relatively low investment and risk.

7. Dark Web & Underground Markets – Illegal marketplaces facilitate the sale of stolen data,
hacking tools, and cybercrime services.

8. Insider Threats & Negligence – Employees and insiders may intentionally or unintentionally
cause data breaches.

9. Cyber Warfare & State-Sponsored Attacks – Some governments support hacking for espionage,
disruption, or political gain.

10. Overburdened Legal Systems – Courts and law enforcement agencies may be overwhelmed
with cybercrime cases, leading to delays in justice.

7. Common Types of Cyber Crime?

Common Types of Cybercrime

1. Hacking – Unauthorized access to computer systems to steal, modify, or destroy data.

2. Phishing – Deceptive emails, messages, or websites used to steal sensitive information like
passwords and credit card details.

3. Identity Theft – Using stolen personal information for fraud, such as opening bank accounts or
making unauthorized transactions.

4. Ransomware Attacks – Malicious software that locks files or systems and demands payment
for their release.

5. Online Scams & Fraud – Fake lotteries, investment frauds, and e-commerce scams to steal
money from victims.

6. Cyberstalking & Harassment – Online threats, blackmail, or harassment through social media,
emails, or messaging platforms.

7. Denial-of-Service (DoS) Attacks – Overloading a website or network to make it unavailable to


users.

8. Malware Attacks – Viruses, worms, spyware, and Trojans used to damage or steal data from
systems.
9. Data Breaches – Unauthorized access to confidential data, often leading to financial or
reputational damage.

10. Cyber Espionage – Spying on individuals, businesses, or governments to gather sensitive


information.

8. Common Types of Cyber Crime in the Philippines?

In the Philippines, cybercrime has become a significant concern, with various forms affecting
individuals, businesses, and government institutions. According to the Philippine National Police
(PNP), swindling or fraudulent schemes aimed at deceiving individuals for personal gain are the most
prevalent, accounting for approximately 15,000 incidents.

Phishing attacks are also widespread, where malicious actors send deceptive emails or messages to
trick recipients into revealing sensitive information, such as passwords or financial details.

Other common cybercrimes in the country include identity theft, where personal information is stolen
and misused; hacking, involving unauthorized access to computer systems; and online harassment or
cyberstalking, which entails using digital platforms to intimidate or threaten individuals.

The Philippine government has enacted the Cybercrime Prevention Act of 2012 (Republic Act No.
10175) to address these issues, defining offenses such as illegal access, system interference, and data
interference.

Despite these legal measures, cybercrime remains a persistent challenge, necessitating continuous
efforts in public awareness, cybersecurity enhancements, and law enforcement to mitigate its impact.

You might also like