Cybercrimes take place online. There are two overarching areas of cybercrime:
These crimes take on a number of different formats - from hacking and use of the dark web to trolling on social media and phishing or identity thefts. The aims of such activities may be to commit sexual offences such as grooming or sharing indecent images, to control or disrupt computer systems, or steal money, information or data. The dark web is used by criminals to trade illegal items online including drugs and firearms. CybercrimeHacking is the unauthorised use of or access into computers or networks by using security vulnerabilities or bypassing usual security steps to gain access. Criminals may hack systems or networks to steal money or information, or simply to disrupt businesses. Malicious software - or malware - can be spread between computers and interfere with the operations of computers. It can be destructive, causing system crashes or deleting files, or used to steal personal data. Viruses, worms, Trojans, spyware and ransomware are all types of malware. Distributed Denial-of-Service (DDOS) attacks are where more than one, and often thousands, of unique IP addresses are used to flood an internet server with so many requests that they are unable to respond quickly enough. This can cause a server to become overloaded and freeze or crash, making websites and web-based services unavailable. The dark web is made up of a number of untraceable online websites. Specific software and search engines must be used to access the websites. Social media offencesTrolling is a form of baiting online which involves sending abusive and hurtful comments across all social media platforms. This can be prosecuted under the Malicious Communication Act 1988 and the Communications Act 2003. Online threats could take many forms including threats to kill, harm or to commit an offence against a person, group of people or organisation. Disclosure of private sexual images without consent – so called “revenge porn” is a broad term covering a range of activity usually involving an ex-partner, uploading intimate sexual images of the victim to the internet, to cause the victim humiliation or embarrassment. It is a criminal offence to re-tweet or forward without consent, a private sexual photograph or film, if the purpose was to cause distress to the individual depicted. Online harassment can include repeated attempts to impose unwanted communications or contact in a manner that could be expected to cause distress or fear. Grooming refers to the actions of an individual who builds an emotional connection with a child to gain their trust for the purposes of sexual abuse or sexual exploitation. Stalking online is a form of harassment which can involve persistent and frequent unwanted contact, or interference in someone’s life Virtual mobbing takes place when a number of individuals use social media or messaging to make comments to or about another individual, usually because they are opposed to that person's opinions. The volume of messages may amount to a campaign of harassment. Cyber-enabled fraudFraudsters use the internet to gain sensitive personal information through phishing attempts. Often criminals pretend to be a company and trick a victim into using a malicious website or installing malware on their device. A phishing attempt can be sent to a range of ‘targets’ at the same time. This can lead to identity theft - criminals gathering enough information about a victim to take their identity and commit fraud. Personal details can be used to obtain documents such as passports or driving licences, open bank accounts or credit card accounts, or take over existing bank accounts. Criminals can also use the internet to carry out intellectual property fraud - creating counterfeit goods to sell online, either billed as genuine or clearly fake, or setting up and running websites purporting to be genuine retail outlets. Intellectual property fraud includes streaming content owned by someone else online, for example a new cinema release or live sports matches. Read more information on fraud.
BOBITLMR272918 Assignment 3 for IRM 1. Discuss Four security threats in modern day ICT environment Spoofing and sniffing Hacker attempting to hide their true identities often spoof or misrepresent themselves by using fake e-mail addresses or masquerading as someone else. Spoofing also may involve redirecting a web link to an address different from the intended one. Spoofing is faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers. Sniffer is a type of eavesdropping program that monitors information travelling over a network. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files and confidential reports. Denial of service attack. Hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.The network receives so many queries that it cannot keep up with them and is thus unavailable to service legitimate requests. Malicious software. Malicious software programs are referred to as malware and include a variety of threats, such as computer viruses, worms and Trojan horse. Computer virus is a software program that attaches itself to other software programs or data files in order to be executed, usually
Sign up to view the full document! lock_open Sign Up
without user knowledge or permission. Worms are independent computer programs that copy themselves from one computer to other computers over a network. Trojan horse is a software program that does something other than expected.(tricks) 2. Discuss factors influencing how security can be implemented in a networked environment . Evidence You will not allow a risk to occur in a way that avoids the production of evidence. The event will occur while also revealing a root cause for a post-mortem, which lets you learn from mistakes.This will accumulate enough data to only let an event happen once, because you’ll be better informed for future mitigation s that are more comprehensive than what exists. Containment It may be impossible to prevent an event from occurring, but you can make guarantees that damage will be limited when it does. Prevention The Prevention factor commits to reducing the likelihood of a risk. When completed, the possibility a threat would succeed is unlikely or not at all applicable. Or, at least not without being detected. Elimination At this stage we will reduce the cost of mitigating a risk so dramatically that we’ll find ourselves with resources to pursue other risks.
Sign up to view the full document! lock_open Sign Up
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science! |