There is a fairly long list of ways in which people commit cybercrimes (crimes committed using computer technology). Some are simply mildly irritating, while others range from financially disastrous to life-threatening.

An example of website spoofing.
An example of website spoofing (as well as Fake News)

1. List

Here is an (incomplete) list of terms you need to study:

  1. Malware
    1. Computer viruses
    2. Ransomware
    3. Bots & botnets
    4. Spyware
      1. Keylogger
  2. Social Engineering
    1. Catfishing
    2. Pharming
    3. Phishing (Smishing)
    4. Spearphishing
    5. Scareware
    6. Spoofing is when something (a person, program or website) successfully identifies as another by falsifying data or impersonating someone or something else.
  3. DDoS
  4. Hacking
  5. Spam
  6. Click-jacking

Common assessment questions include asking you to describe the difference between the types of techniques.

2. Categories

  • Categorisation of cybercrimes.
  • Categorisation of cybercrimes: Harassment.
  • Categorisation of cybercrimes: Internet attacks.
  • Categorisation of cybercrimes: Theft.

3. How malware is used

  • Identity theft
  • Fraud
  • Industrial espionage
  • Sabotage
  • Theft of data
  • Cyber terrorism

References:

  1. Wikimedia contributors. (2023) Social engineering (security). Available at: https://en.wikipedia.org/wiki/Social_engineering_(security) (Accessed: 2 November 2023).

By MisterFoxOnline

Mister Fox AKA @MisterFoxOnline is an ICT, IT and CAT Teacher who has just finished training as a Young Engineers instructor. He has a passion for technology and loves to find solutions to problems using the skills he has learned in the course of his IT career.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.