100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary - cybercrime lecture 1 (620068-M-6)

Rating
-
Sold
1
Pages
7
Uploaded on
30-11-2023
Written in
2023/2024

discusses all of the key concepts from the literature.

Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
November 30, 2023
Number of pages
7
Written in
2023/2024
Type
Summary

Subjects

Content preview

Lecture 1: concepts of cybercrime
The evolution of Cybercrime, 2004-2014 – Grabosky

Abstract
This article reviews developments in cybercrime in the ten years to 2014. It observes that in
the basic substance of cybercrime offences is essentially the same as in the past. However,
cybercrimes are now executed with greater sophistication, increasingly for purposes of
financial gain, and by an increased diversity of organizational structures, including
government agencies and state proxies. The article concludes with a discussion of
applications of digital technology that have emerged over the past decade, and their
potential for criminal exploitation.

Trends in cybercrime
- Sophistication
o From DDoS to botnets
o Evident in
 Particular market segments, such as academics
 Scareware
 Obtaining unauthorized access to a legitimate user’s email address
book
 Trojan horses
 Tor  anonymity
- Commercialization
o Routine activity theory
 The greater the number of persons connected to the internet, and the
greater the volume of online commerce, the more theft will occur in
cyberspace.
o More hackers for hire
o Hacker tools are free to download or for sale/rent
o Code brokers
- Organization
o Many cybercriminals work alone, but a great deal of cybercrime is the work of
organizations (e.g., botnets)

Structures
- Dreamboard
o Exchanged illicit images of children under the age of twelve.
- Dark Market
o Exchange of stolen credit card and banking details, malicious software, and
related technology.
- Anonymous
o Collective of anarchists, based on a shared ethos of mischief and resentment
of authority  hactivism
- Ukranian ZeuS Group
o ZeuS virus  gains access to computers of individuals employed in a variety
of non-governmental organizations in the US.
$4.22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
WilliamAdam

Get to know the seller

Seller avatar
WilliamAdam Tilburg University
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
5 year
Number of followers
1
Documents
6
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions