Summary

This document provides an introduction to cybercrime, covering different types of cyberattacks, including hacking, malware, and social engineering tactics. It also details various types of malware, including viruses and worms.

Full Transcript

PUBLIC SAFETY JUNIOR LEADERSHIP COURSE TYPES OF CYBERCRIME PLTCOL JOEL C TUTTUH Associate Professor II INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE...

PUBLIC SAFETY JUNIOR LEADERSHIP COURSE TYPES OF CYBERCRIME PLTCOL JOEL C TUTTUH Associate Professor II INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE What is Hacking? Act of circumventing security measures to gain unauthorized access to a computer system or network. Unauthorized access to or control of computer systems or networks INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Type of Hackers Black Hat Hackers White Hat Hackers (Ethical hackers) Gray Hat Hackers INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Black Hat Hackers Engage in Malicious Activities Stealing data Financial fraud Causing damage INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE White Hat Hackers Ethical Hackers Identify and Fix Security Vulnerabilities in the system Working to protect from attacks. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Grey Hat Hackers Exploiting vulnerabilities without malicious intent. Without authorization Expose vulnerabilities to gain recognition or offer to fix them for a fee. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Protecting Against Hacking Strong Passwords Software Updates Anti-virus Software Firewalls Multi-Factor Authenticator Security Awareness Data Backups INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE What is Malware? Short of Malicious Software aaa Infiltrate a computer system to perform malicious activities w/out the user’s consent. Can be acquired via: a. Download files on a suspicious and unsecured website. b. Shared files on flash drives and network drives. c. Attachments on emails. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Malware Capabilities Propagation – the ability to spread to other systems. Destruction – deleting critical system files and stopping computer operations. Extortion – ability to fuel far and demand money. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Malware Capabilities Exploitation – the ability to exploit vulnerabilities to gain access and control of the target system. Deception- the ability to trick users into downloading infected files or other malicious components. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Malware Capabilities Information Theft – the ability to steal critical and sensitive user information demand. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Computer Virus Is a type of malware that, when executed, replicates itself by modifying other computer programs. Cannot be spread without human action. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Computer Worm Malicious software that spreads itself from one computer to another without human interaction. It’s a standalone program that can replicate itself. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Bot Malware Known as botnet Infects computers and turns them into “zombies” or “bots” under the control of a remote attacker. Exploits vulnerabilities in computer systems. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Ransomware Malicious software that holds a victim’s sensitive data or device hostage unless the victim pays ransom to the hacker. Encrypt data and extort a ransom payment. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Trojan Horse Is a computer software that looks legit or innocent but actually harmful. It tricks users into downloading and installing it, often through social engineering tactics like phishing or fake advertisement. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Backdoor Malware type that negates normal authentication procedures to access a system. Is a means of access to a computer program that bypasses security mechanism. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Spyware Malicious software that is installed on a computer device without the end user’s knowledge. Aims to gather information about the person or organization and send to another entity. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Rootkit “root” traditional name of the privileged account on UNIX. “kit” software components that implement the tool. Set of programs that patch and trojan existing execution paths within the system. Hackers have to access to the root-level to install a rootkit. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE How to Prevent Malware? Keep system, tools and apps patched and updated regularly Avoid installing suspicious or cracked apps. Do not insert unknown flash drives into your computer. Install and enable AV software or reliable endpoint security. Avoid downloading or clicking suspicious links on unknown websites and pop-up prompts. Be wary of email links and attachments before opening. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Social Engineering Is the act of manipulating people into divulging sensitive information or performing acts that compromise security. Phishing, pretexting, baiting, and tailgating are examples of social engineering. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Social Engineering (Cycle) INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Types of Social Engineering Phishing Vishing Spear Phishing Business Email Whaling Compromise Baiting (BEC) Pretexting Water Hole Tailgating Attacks Quid Pro Qou Scareware Smishing Romance Scams INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Phishing Is the act of manipulating people into divulging sensitive information or performing acts that compromise security. Phishing, pretexting, baiting, and tailgating are examples of social engineering. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Denial-of-Service An attempt to overload a website or network, to degrade its performance or even to make it completely inaccessible. Flood of traffic causes the target to become slow, unresponsive, or completely inaccessible to legitimate users. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Identity Theft Cybercriminal steals your personal information and uses it to impersonate you. Uses it without your permission to commit fraud or other illegal activities. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Online Scams Deceptive schemes carried out by cybercriminals using the internet to steal information, money, or both. Stealing money and personal information. INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Types of Online Scams Phishing Scams Romance Scams Tech Support Scams Lottery and Prize Online Shopping Scams Scams Charity Scams Social Engineering Impersonation Scams Scams Work-from-Home Investment Scams Scams INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE How to Protect from Online Scams Educate yourself Strengthen your Online Security Be Cautious with Personal Information Secure Online Transactions Avoid Public WIFI INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE Other Types of Cybercrime Cyberbullying Doxxing Cyber Extortion Cyber Espionage Cyber Stalking Prohibited/Illegal Consent Financial Fraud Software Piracy INTRODUCTION TO CYBERCRIME PUBLIC SAFETY JUNIOR LEADERSHIP COURSE THANK YOU! INTRODUCTION TO CYBERCRIME

Use Quizgecko on...
Browser
Browser