Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views3 pages

Computer Crime1

Uploaded by

sonidave06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Computer Crime1

Uploaded by

sonidave06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

WHAT IS COMPUTER CRIME?

Computer crime, also known as cybercrime or digital crime, refers to criminal activity that involves the
use of computers or connected devices such as smartphones, tablets and other electronic devices. This
includes hacking, identity theft, phishing scams, virus and malware attacks, online fraud, cyberbullying,
cyberstalking and many other illegal activities. Perpetrators of computer crime can be individuals,
groups, or organizations that use technology to carry out illegal activities. Cybercrime can result in
financial loss, reputational damage, and even physical harm. This is a growing problem in today’s
increasingly digital world, and law enforcement agencies are constantly developing new techniques and
strategies to combat it.

Three types of computer crime:

1. MALWARE ATTACK:

Malware is malicious software designed to damage your computer system or steal sensitive information.
Malware attacks can come in many different ways. For example, email attachments, downloads from
untrusted websites, infected USB drives, etc. The purpose of malware attacks is usually to gain
unauthorized access to sensitive data or to interfere with normal system operation. Common malware
includes viruses, worms, Trojan horses, and ransomware.

Malware attacks are a common form of cyber-attack that can cause significant damage to an
organization. Here are some examples of organizations affected by malware attacks:

Maersk:

In 2017, the Maersk shipping company fell victim to NotPetya malware attack. Malware spread rapidly
through the company’s network, encrypting files and disrupting operations. The attack cost Maersk an
estimated $300 million in lost revenue and remediation costs.

Ukrainian power grid:

In 2015 and 2016, the Ukrainian power grid was hit by two separate malware attacks that caused
widespread power outages. The attacks are believed to have been carried out by state-sponsored
Russian hackers who used malware to gain access to the power grid’s control systems and disrupt
operations. Equal sign:

In 2017, Equifax, a credit bureau, suffered a data breach caused by a vulnerability in the company’s
website software. The vulnerability was exploited by hackers who installed malware on the company’s
servers, resulting in the compromise of the personal and financial data of approximately 143 million
customers.

These are just a few examples of companies hit by malware attacks. It is important that organizations
take steps to protect their systems and data from malware, such as updating software, using antivirus
and antimalware software, and educating employees about the risks of phishing and other types of
attacks.

2. IDENTITY THEFT:
Identity theft is a type of computer crime that steals personal information for fraudulent purposes.
Cybercriminals can obtain personal information in a number of ways, including phishing scams, social
engineering, and hacking of personal information databases. Once cybercriminals have your personal
information, they can use it to open credit accounts, make fraudulent purchases, or even impersonate
victims of criminal activity.

Identity theft is a serious problem that can cause significant damage to individuals and organizations.
Examples of organizations affected by identity theft are:

Yahoo:

In 2013 and 2014, Yahoo had two separate data breaches that compromised the personal information of
all of his 3 billion user accounts. The breach was caused by hackers using stolen credentials to access the
Yahoo network.

IRS:

In 2015, the Internal Revenue Service (IRS) experienced a data breach that compromised the personally
identifiable information of approximately 330,000 taxpayers, including social security numbers, dates of
birth, and other sensitive information. The breach was caused by hackers using stolen credentials to gain
access to the IRS’ online systems.

Capital One:

In 2019, financial services company Capital One was involved in a data breach in which the personally
identifiable information of approximately 100 million customers in the United States and 6 million in
Canada, including names, addresses, dates of birth, and social security numbers, was compromised.
Experienced. The breach was caused by hackers who accessed Capital One’s network through a firewall
vulnerability.

Marriott International:

In 2018, Marriott International announced it experienced a data breach in which the personal
information of approximately 500 million customers was compromised, including names, addresses,
dates of birth, passport numbers and other sensitive information. The breach was due to the hacker
using stolen credentials to access his Marriott network.

3. CYBERSTALKING:

Cyberstalking is a type of computer crime that uses electronic means to harass or intimidate individuals.
Cyberstalkers can contact victims using a variety of means, including: B. Email, Social Media, or Text
Messages. The goal of cyberstalking is often to inflict fear, anxiety, or emotional distress on the victim. In
some cases, cyberstalking can escalate to physical violence and real-world stalking.

These are just a few examples of the many types of computer crime that exist. As technology continues
to advance, new forms of cybercrime are likely to emerge, highlighting the importance of staying vigilant
and taking steps to protect personal and confidential information. Cyberstalking is a serious problem
that affects both individuals and organizations. Examples of organizations targeted by cyberstalking
include:
Sony Pictures:

In 2014, Sony Pictures was targeted in a massive cyberattack that resulted in the exposure of sensitive
company data, including emails and employee personal information. The attack was carried out by a
group calling itself the Guardians of Peace, and cyberstalking is believed to have been a tactic used to
gather information about the company.

Target:

In 2013, Target experienced a data breach that compromised the personal and financial information of
approximately 110 million customers. The breach was the result of a cyberattack that used malware to
steal customer data from the company’s POS system. Cyberstalking is believed to have played a role in
this attack, as the hackers likely gathered information about the company's security systems and
vulnerabilities before launching their attacks.

Ashley Madison:

Ashley Madison is a dating site that was cyberstalked in 2015. A group calling themselves the Impact
Team claimed responsibility for the attack, exposing the personal information of the site’s users. The
attackers claimed to have targeted her website because they wanted to encourage infidelity and
humiliate website users.

As our reliance on technology and the internet grows, cybercriminals are constantly finding new ways to
exploit vulnerabilities to steal sensitive information. The impact of cybercrime is enormous and can
result in financial loss, reputational damage, and impact on personal privacy and security.

To combat cybercrime, individuals and organizations should take proactive measures to protect
themselves, such as using strong passwords, keeping software up to date, and guarding against phishing
and other types of attacks. Is important. Governments and law enforcement agencies also play an
important role in fighting cybercrime by developing strict cybersecurity policies and regulations to
identify and prosecute cybercriminals.

As technology evolves, so does the nature of cybercrime. It is critical that individuals, organizations and
governments continue to be vigilant and proactive in protecting against cyberthreats and invest in
developing new technologies and strategies to combat cybercrime.

You might also like