Zusammenfassung der Ressource
CYBER CRIME AMD SECURITY
- What to check?
- Greeting (personalised)
- request for personal information
- Poor
spelling/grammar
- forged links
- make sure the lock sign on the top
bar is locked
- sense of urgency
- “It makes more money for criminals than illegal drug
trafficking”
- “Someone’s identity is stolen
every 2 seconds as a result of
cybercrime”
- “An unprotected PC can become
infected within four minutes of
connecting to the Internet”
- Types of cyber crimes
- Trojan horse
- Phishing
- spam
- malware
- Malware is a software that breaks onto the
victim's account to steal their personal
information and makes their details leak out to
public
- it might gather personal or sensitive data
from your computer
- or it could modify or delete
files on your computer
- types of malware
- LOGIC BOMBS are a set of instructions at a certain date
and time or under specified conditions which are then
executed when the victim has done
- RANSOMWARE is a software illegally installed on a computer so that the user cannot access their files until a ransom is paid. e.g. this happened to NHS
- Common types of malware
- Browser/ spyware (hijacks some browser functions) e.g.
defaults your search page, or diverts you to another
particular website.
- File infector (Its a virus that infects a particular file, it could overwrite the file
- Macro virus (embedded in the template files like Word or excel. It could
also spreads when the file is opened on a different computer.
- short for 'malicious
software'
- virus
- A virus is a type of malware
- It replicates and installs itself
without your consent
- A virus can be spread to another computer
trough emails or files which the victim sends
- It can do key logging which means it can look at everything you have typed
- Advanced fee scams
- worms
- email scams
- Computer misuse
- looking at people's data
- changing someone's data
- creating a virus
- Why do hackers
do it?
- pure mischeif or challenge
- to steal money
- to steal or modify information
- for political information
- to expose wrongdoings
- to get revenge on people with opposing views
- how do hackers do it/
- take advantage of security weaknesses in
older computer software
- take advantage of obvious/ common usernames and passwords
- tricking people into download malware onto
their computer, which gives the hacker access to
view and modify your files
- How to avoid malware
- Avoid clicking on everything e.g. offers that are too good to be true
- Don't visit illegal sites
- Make sure your browser is configured to always ask before running or dowlading files automatically
- Keep your browser software up-to-date
- Install up-to date antivirus and
anti-spyware software