Module 3.2
Computer crimes and criminals
Computer criminals
Anyone who uses ICT to commit a crime
1. Hacker
Uses skills to access computer systems, networks, and information illegally
White hat (good) and black hat (bad) hackers
2. Cracker
Break passwords or gain illegal access to systems
Intent to compromise data
3. Virus author
Writes code for a virus/malware
Creates templates other can buy, modify and use
4. Cybergang
Group of people who help each other commit cybercrime
5. Spammer
Can spread malware
Clogs the internet with a lot of unnecessary traffic
Types of cybercrime
Theft
Taking something without permission
Physical computer Rather stolen to access data
Intellectual property Piracy: illegal copies of material e.g., music, books
Identity theft Steals your details to pretend they are you
Financial gain Criminal places a skimmer and camera at ATM
Skimmer reads electronic details on card and camera
records your pin
Espionage Sell/use it themselves
Resource theft Use other people’s resources without paying for it
Piggybacking: gain access to someone else’s Internet
connection – bad password policy – IP address not traced
back to them
Botnets: use malware to gain control of multiple
computers
Abuse and extortion
Cyberbullying
Uses ICT to embarrass or threaten a person
Extortion and blackmail
Information that will damage someone’s reputation, unless a specific amount is paid
Computer crimes and criminals
Computer criminals
Anyone who uses ICT to commit a crime
1. Hacker
Uses skills to access computer systems, networks, and information illegally
White hat (good) and black hat (bad) hackers
2. Cracker
Break passwords or gain illegal access to systems
Intent to compromise data
3. Virus author
Writes code for a virus/malware
Creates templates other can buy, modify and use
4. Cybergang
Group of people who help each other commit cybercrime
5. Spammer
Can spread malware
Clogs the internet with a lot of unnecessary traffic
Types of cybercrime
Theft
Taking something without permission
Physical computer Rather stolen to access data
Intellectual property Piracy: illegal copies of material e.g., music, books
Identity theft Steals your details to pretend they are you
Financial gain Criminal places a skimmer and camera at ATM
Skimmer reads electronic details on card and camera
records your pin
Espionage Sell/use it themselves
Resource theft Use other people’s resources without paying for it
Piggybacking: gain access to someone else’s Internet
connection – bad password policy – IP address not traced
back to them
Botnets: use malware to gain control of multiple
computers
Abuse and extortion
Cyberbullying
Uses ICT to embarrass or threaten a person
Extortion and blackmail
Information that will damage someone’s reputation, unless a specific amount is paid