What Is Cybercrime: What Is A Computer Crime?

1469 Words3 Pages

WHAT IS CYBERCRIME?
Cybercrime, also called computer crime is any illegal activity that involves a computer or network connected device, such as a mobile phone. This crime is divided into 3 categories which are:
• Crimes in which the computer device is the target
• Crimes in which the computer device is used as a weapon
Crime in which the computer is used as an accessory to a crime
You can find different types of cybercrimes which are:
• Identity theft
• Ransomware
• DDOS attacks
• Botnets
• Spam and Fishing
• Social Engineering
• Malvertising
• PUPs
• Drive By Downloads
• Remote administration tools
• Exploit Kits
• Scams
• Cyber stalking
• Cyber bullying
• Hacking/cracking
• Cyber terrorism
• Software piracy
• Credit card theft
• Network …show more content…

This is usually accomplished by scanning an organization’s network – with tools easily found on the Internet – to find entry points. This step of the process usually goes slowly, sometimes lasting months, as the attackers search for vulnerabilities.
3. Access and Escalation
Now that weaknesses in the target network are identified, the next step in the cyber-attack is to gain access and then escalate. In almost all such cases, privileged access is needed because it allows the attackers to move freely within the environment.
4. Exfiltration
With the freedom to move around the network, the attackers can now access systems with an organization’s most sensitive data – and extract it at will. But stealing private data is not the only action intruders can take at this time. They can also change or erase files on compromised systems.
5. Sustainment
The attackers have now gained unrestricted access throughout the target network. Next is sustainment, or staying in place quietly. To accomplish this, the hackers may secretly install malicious programs like root kits that allow them to return as frequently as they want. And with the elevated privileges that were acquired earlier, dependence on a single access point is no longer necessary. The attackers can come and go as they please.
6.

Open Document