Computer Crime and Threats PDF

Summary

This document covers cybercrime and threats. It describes the concept of cyberspace, different types of cybercrimes including hacking, social engineering, and malware, and their consequences. It also provides a brief overview of the concept of cybercrime.

Full Transcript

CYBERCRIMES AND THREATS -.. , MUHANNAD ALRIHALI 1. INTRODUCTION 1.INTRODUCTION OUTLINE What is cyber space? What space? What is cybercrime? Type of of cybercrimes Causes Causes&& Reasons behind crimes Consequnces Conseq...

CYBERCRIMES AND THREATS -.. , MUHANNAD ALRIHALI 1. INTRODUCTION 1.INTRODUCTION OUTLINE What is cyber space? What space? What is cybercrime? Type of of cybercrimes Causes Causes&& Reasons behind crimes Consequnces Consequnces&& Impact behind crimes Q/A Q/A WHAT IS CYBER SPACE? Cyberspace is isa a broad and and complex term that refers to the the virtual environment created by interconnected digital diqital devices, devices, networks, and and systems, such as the internet, internet, telecommunications networks, computer systems, and and other digital diqital infrastructure. It encompasses the entire digital theentire diqital ecosystem, ecosystem, including includinq the the data, information, information, and and interactions that occur within it. Cyberspace is isa a man-made man—made domain, distinct from the the physical world, where communication, commerce, social interaction, interaction, entertainment, and andaa wide range ranqe of of activities take place using usinq digital diqital technologies. technoloqies. Cyberspace is also associated with cybersecurity, as it is isa a domain that requires protection protection against aqainst threats such as hacking, hackinq, cybercrime, cybercrime, data breaches, and and other malicious activities that target tarqet digital diqital assets and and infrastructure. WHAT IS CYBERCRIME? Cybercrime is criminal activity that either tarqets targets or uses usesaa computer, computer,aa computer network or or aa networked device. Most cybercrime is committed by cybercriminals or hackers who who want to to make money. However, occasionally cybercrime aims to to damage damaqe computers or or networks forreasons for reasons other than profit. These could be be political or or personal. personal. Cybercrime can be carried out out by individuals or organizations. orqanizations. Some cybercriminals are organized, orqanized, use use advanced techniques and and are highly hiqhly technically skilled. Others are novice hackers. TYPE OF CYBERCRIMES TYPE OF CYBERCRIMES When any When crime is anycrime is committed committed over the Internet, over the Internet, it it is is referred referred to to as asaa cyber cyber crime. crime. There There are are many types of many types of cyber cyber crimes, crimes, and the most and the most common common ones ones are are explained explained below: below: Hacking: Haching: Unauthorized Unauthorized access to computer access to computer systems systems oror networks to steal, networks to steal, alter, alter, or or delete delete data. data. Hackers Hackers may may exploit exploit vulnerabilities vulnerabilities in in software software to to gain gain control control of of systems. systems. Social Social Engineering: Engineering: Manipulating Manipulating people people into into divulging divulging confidential confidential information information or or performing performing actions that actions that compromise compromise security. security. Phishing Phishing is isaa common common form form of of social social engineering. engineering. Phishing: Phishing:AA type type of of social social engineering engineering attack attack where where cybercriminals cybercriminals send fraudulent messages send fraudulent (often via messages (often via email) email) pretending pretending to to be be from from reputable reputable sources sources to trick individuals to trick individuals into into revealing revealing sensitive sensitive information, information, such such as as passwords passwords or or credit credit card card numbers. numbers. Malware: Malware: Malicious Malicious software, software, such such as as viruses, worms, trojans, viruses, worms,t rojans, ransomware, ransomware, and and spyware, spyware, designed designed to to damage damage or disrupt computer ordisrupt computer systems, systems, steal steal data, data, or or gain gain unauthorized unauthorized access. access. Ransomware: Ransomware:AA specific specific type type of of malware malware that that encrypts encrypts aa victim's victim’s data data and and demands demands payment (ransom) to payment (ransom) to restore restore access. access. It It often targets organizations often targets organizations and and critical critical infrastructure. infrastructure. Identity Theft: Stealing Identity Theft: Stealing someone’s someone's personal personal information (e.g., Social information (e.g., Social Security Security number, number, credit credit card card details) details) to to commit fraud, such commit fraud, such as as opening opening accounts accounts or or making making unauthorized transactions in unauthorized transactions in the the victim’s victim's name. name. TYPE OF CYBERCRIMES Distributed Distributed Denial-of-Service (DDoS): Overloading Denial-of-Service (DDoS): Overloadingaa network, website, or network, website, or service with traffic service with traffic to to make make it it unavailable unavailable to to users. users. DDoS DDoS attacks attacks involve involve multiple multiple systems systems to to generate the traffic, generate the traffic, making making them them harder harder to to stop. stop. Cyberstalking: Cyberstalking: Using Using the the internet internet or or other other digital digital means means to harass, threaten, toharass, threaten, or or stalk stalk someone, someone, often through often throug h repeated repeated and and intrusive intrusive communication. communication. Online Online Fraud: Any deceitful Fraud: Any deceitful practice practice carried carried out out over over the the internet internet to to gain gain something something of value, such ofvalue, such as asffinancial inan cial gain gain or or sensitive sensitive information. information. This This includes includes online on line scams, scams, auction fraud, and auction fraud, and credit credit card card fraud. fraud. Intellectual Intellectual Property Property Theft: Theft: Unauthorized Unauthorized access access toto or or copying copying of of someone’s someone's creative works, such creative works, such as as software, software, music, music, movies, movies, or or patents, patents, often often for for illegal illegal distribution distribution or orffinancial inan cial gain. gain. Child Child Exploitation: Exploitation: The The use use of of digital digital platforms to produce, platforms to produce, distribute, distribute, or or access access illegal illegal content content involving involving the the exploitation exploitation of of minors, minors, such such as as child child pornography. pornography. Cyber Cyber Espionage: Espionage: The The use use of of digital digital tools tools to to spy spy on on organizations, organizations, governments, governments, or or individuals individuals to to gather gather confidential confidential information, information, often often for for political political or or competitive competitive advantage. advantage. Cryptojacking: Cryptojacking: Unauthorized Unauthorized use use of of someone someone else’s else's computer computer resources resources to to mine mine cryptocurrencies. cryptocurrencies. This This is is often often done done through through malware that secretly malware that secretly uses the victim's uses the victim’s computing computing power. power. CAUSES & REASONS BEHIND CRIMES Financial Financial Gain: Gain: Many Many cybercriminals cybercriminals are are motivated motivated by by the the potential potential for for financial financial rewards. rewards. Activities Activities like like phishing, phishing, ransomware ransomware attacks, attacks, online fraud, and online fraud, and identity identity theft theft are are often often conducted conducted to to steal steal money money or valuable orvaluable financial financial information. information. Political Political or or Ideological Ideological Motives: Hotives: Some Some cybercrimes cybercrimes are areddriven riven by by political political or or ideological ideological beliefs. beliefs. Hacktivists Hacktivists use use cyber cyber attacks attacks to to promote promote their their causes, causes, protest protest against against government government actions, actions, or orddraw raw attention attention to to social social issues. issues. They They may may deface websites, leak deface websites, leak sensitive sensitive information, information, or or disrupt disrupt services. services. Revenge or Personal Revenge or Vendettas: Cybercriminals Personal Vendettas: Cybercriminals may may target target individuals, individuals, organizations, organizations, or or governments governments out out of of personal personal revenge. revenge. Disgruntled Disgruntled employees, for example, might employees, forexample, might use their knowledge use their knowledge of ofaa company’s company's systems to systems to cause cause harm harm after after being terminated. being terminated. Curiosity Curiosity or Thrill-Seeking: Some or Thrill-Seeking: Some individuals, individuals, particularly particularly younger younger or or less less experienced experienced hackers, hackers, engage engage in in cybercrimes cybercrimes out out of of curiosity curiosity or or for for the the thrill thrill of of breaking breaking into into systems. systems. They They may may not not have have malicious malicious intent intent but but are areddriven riven by by the the challenge. challenge. CAUSES & REASONS BEHIND CRIMES Terrorism: Terrorist Terrorism: Terrorist organizations organizations may may use use cyber cyber attacks attacks to to disrupt disrupt critical critical infrastructure, infrastructure, spread spread propaganda, propaganda, or or instill fear. The instill fear. The aim aim is is often to cause often to cause widespread widespread disruption, disruption, harm harm economies, economies, or or undermine undermine trust trust in in institutions. institutions. Psychological Psychological Factors: Factors: Some Some cybercriminals cybercriminals are are motivated motivated by the desire by the desire for for power power and and control, control, enjoying enjoying the the sense sense of of dominance they gain dominance they gain from from manipulating manipulating systems systems or or people. people. Lack of Effective Lach of Effective Law Law Enforcement: Enforcement: SomeSome regions regions may may lack lack comprehensive comprehensive cybercrime cybercrime laws laws or or the the resources resources to to enforce enforce them, them, making making it it easier easier for for criminals criminals to to operate operate with with impunity. impunity. Lack of Awareness Lach of Awareness and and Security: Security: Many Nany cybercrimes cybercrimes exploit exploit vulnerabilities vulnerabilities in in systems that lack systems that lack adequate adequate security security measures. measures. Poorly Poorly configured configured networks, networks, outdated outdated software, software, weak weak passwords, passwords, and and untrained untrained users users can can make make systems systems easy easy targets. targets. Globalization and Interconnectedness: Globalization and Interconnectedness: AsAs more more systems systems become become interconnected interconnected globally, globally, the the potential potential for for cybercrime cybercrime increases. increases. The The complexity complexity and and scale scale of of these these networks networks create create more more opportunities opportunities for for cybercriminals cybercriminals to to exploit weaknesses. exploit weaknesses. CONSEQUNCES & IMPACT BEHIND CRIMES @ major irnpacas of CvBERCRIMe e« Business Consequences CONSEQUNCES & IMPACT BEHIND CRIMES Financial Loss Direct Financial Theft: Victims may may suffer immediate financial losses due due to theft, fraud, or extortion, such as in cases of of ransomware attacks, online banking bankinq fraud, or unauthorized unauthorized transactions. Business Disruption: Disruption: Cyber attacks like ransomware or denial-of-service (DoS) can ordenial-of-service can disrupt business operations, operations, leading to lost revenue, productivity declines, and and increased operational operational costs. Data Breach Personal Data Compromise: Cybercrimes often result in the the theft of personal information, information, such as social security numbers, credit card details, details, and and medical records. This can can lead to identity theft and and other forms of fraud. offraud. Intellectual Property Theft: Cybercriminals may may steal valuable intellectual property, property, trade secrets, or proprietary information, information, causing long-term long—termffinancial inancial damage and and loss of competitive advantage. Loss of of Confidential Information: Information: Sensitive corporate or governmental qovernmental data may may be exposed, leading leadinq to breaches of of confidentiality and and security. CONSEQUNCES & IMPACT BEHIND CRIMES Operational Disruption Service Outages: Cyber attacks can can cause significant disruptions to IT IT systems, leading to downtime and interruption interruption of services, affecting business operations and and customer experiences. experiences. Supply Chain Impact: Cybercrimes can also impact supply chains, especially when critical critical suppliers are targeted, tarqeted, causing causinq delays and and increased costs in the the production production and and distribution of goods. qoods. Reputation Damage Loss of of Trust: Organizations Orqanizations that fall victim to cybercrimes, cybercrimes, especially data breaches, often suffer significant siqnificant damage to their reputation. damaqe totheir reputation. Customers, Customers, partners, and and stakeholders may may lose trust, leading leadinq to toaa decline in business. Brand Damage: Negative Neqative publicity resulting resultinq from cyber incidents can tarnish a brand’s can tarnisha brand's image, imaqe, potentially leading to a loss of customers and market share. leadinq toa CONSEQUNCES & IMPACT BEHIND CRIMES Legal and and Compliance Consequences and Litigation: Lawsuits and Litigation: Victims of cybercrime, cybercrime, including includinq customers and partners, may may file lawsuits against aqainst the affected organizations, orqanizations, leading leadinq to costly legal leqal battles and and settlements. Regulatory Penalties: Penalties: Failure to comply with cybersecurity regulations, requlations, such as the General Data Protection Regulation Requlation (GDPR) or or the Health Insurance Portability and and Accountability Act Act (HIPAA), can can result in heavy fines and and sanctions. sanctions. Psychological and Emotional Psychological and Emotional Impact Impact and Anxiety: Individuals who Stress and who fall victim to cybercrimes, such as identity theft or cyberstalking, cyberstalking, may may experience experience significant significant stress, stress, anxiety, anxiety, and and aa sense sense of violation. of violation. Fear and Uncertainty: Fear and Uncertainty: Repeated Repeated cyber cyber attacks attacks can can create createaa climate climate of of fear fear and and uncertainty, uncertainty, especially for individuals and small businesses, leading to a reluctance to engage in especially for individuals and small businesses, leading toa reluctance to engage in online online activities. activities. THREAT ACTORS Cybercriminals: Individuals Individuals or groups who engage qroups who enqaqe in illegal illeqal activities online, typically for financial gain. qain. This can can include hacking, hackinq, identity theft, ransomware attacks, attacks, and and other forms of of cybercrime. cybercrime. Nation-State Actors: Government-sponsored Government—sponsored groups qroups or or individuals who who conduct cyber espionage, espionaqe, cyber warfare, or other activities to further the the interests of ofaa nation. These actors often have significant siqnificant resources and and capabilities. capabilities. Insider Threats: Threats: Employees, contractors, contractors, or other trusted individuals within an an organization orqanization who misuse their access to who to data or systems for malicious purposes, formalicious purposes, whether intentional intentional or unintentional. Hacktivists: Hacktivists: Individuals or groups who use hacking qroups who hackinq as asaa form of of protest or to promote promoteaa political political or or social agenda. aqenda. Their attacks are often intended to cause disruption, disruption, spread spreadaa message, messaqe, or or draw attention to toaa cause. THREAT ACTORS Script Kiddies: Kiddies: Inexperienced Inexperienced or amateur hackers who who use pre-written pre—written scripts or tools to launch attacks. While they may may lack technical skills, skills, they can can still cause significant siqnificant damage. damaqe. Advanced Persistent Threats (APTs): Highly Hiqhly sophisticated sophisticated and well-funded groups, and well—funded qroups, often associated associated with nation-states, nation—states, that conduct prolonged prolonqed and and targeted tarqeted cyber attacks, usually for espionage espionaqe or or intellectual intellectual property theft. Terrorist Organizations: Groups that use use cyber attacks as asaa tool to further their ideological ideoloqical goals, qoals, including includinq causing causinq fear, disruption, disruption, or physical damage. damaqe. Organized Crime: Well—orqanized Well-organized criminal groups qroups that use use cyber activities as as part of their illegal illeqal operations, operations, such as extortion, extortion, drug trafficking, or human traffickinq. druq traffickinq, trafficking. SYBER THREAT ASTOR MOTIVATION NATION-STATES » GEOPOLITICAL CYBERCRIMINALS -» PROFIT HACKTIVISTS » IDEOLOGICAL ERRORI T ROUP ) > IDEOLOGICAL VIOLENCE ») ATISFSACTION DISCONTENT Q/A THANK YOU FOR FOR LISTENING ANY QUESTIONS? ANY CYBERCRIMES AND THREATS MUHANNAD ALRIHALI ” '-- > 2. 2. Criminology , OUTLINE Criminology Criminology Theory Applying Criminological Theories Cyber Crimes VS VS Traditional Crimes Cyber Harassment Q/A §/A CRIMINOLOGY Criminology is the the scientific study of crime, criminal behavior, and and the the criminal justice system. It involves examining examininq the causes, prevention, prevention, and and control of crime, as well as the social, as the psychological, psycholoqical, and and economic factors that contribute to criminal activity. activity. Criminology Criminoloqy also explores the impact of of crime on victims andand society, the the effectiveness of laws and and law enforcement, enforcement, and functioning of the penal and and the functioninq and correctional correctional systems. Criminologists Criminologists use use various various theories theories and and research research methods methods to to understand why individuals understand why individuals commit crimes and and how how society responds to to criminal behavior. The The field is interdisciplinary, ddrawing rawing on on knowledge knowledqe from sociology, socioloqy, psychology, law, and and other disciplines to analyze and and address address issues issues related related to crime crime and and justice. APPLYING CRIMINOLOGICAL THEORIES ON CYBER CRIMES Criminology Theory refers totoaa set of ideas and and principles that aim aim to explain the the causes ofof criminal behavior, the the functioninq functioning of the criminal justice system, and and the social responses to to crime. crime. These These theories are are used used by by criminologists criminologists to to understand understand why why individuals individuals commit commit crimes, crimes, how how criminal criminal behavior behavior can can be be prevented, prevented, and and how how society society can can best best respond respond toto crime crime and and its its consequences. consequences. Examples Examples of of criminological theories: criminological theories: Routine Routine Activity Activity Theory Theory Social Social Learning Learning Theory Theory Victim Victim Participation Participation Theory Theory ROUTINE ACTIVITY THEORY Routine Activity Theory is explained by the intersection of three factors. 1. 1. Motivated Motivated offenders. offenders. 2. 2. Availability of of suitable target or suitable tarqet or victims. 3. 3. The The absence absence of of capable capable guardians. quardians. Researchers have used this theory to gain qain an an understanding understandinq of the relationship relationship and/or interaction interaction between the the criminal and the victim (Cox, Johnson and Richards, and the Richards, 2009). This theory has been used forfor almost three decades to to effectively explain causation across several categories cateqories of crime and and continues to serve as the theoretical base for for several practical practical explanations of contemporary criminal behavior. behavior. EXAMPLE OF ROUTINE ACTIVITY THEORY Motivated Offender: In cybercrime, cybercrime, motivated offenders could could be be hackers, cybercrimina cybercriminals, or Is, or malicious insiders who who seek financial gain, data theft, or or disruption. Suitable To Target: rget: Suitable torgets targets in the the cyber cyber realm include individuals individua Is or or organizations with va valuable luable data, weak security practices, or or vulnerabilities vulnerabilities in their their systems (e.g., unpatched software, softwa re, weak passwords). Absence of a Capable of a Guardian: Copo ble Guordio n: The “guardian” “guardian" could be be robust cybersecurity cybersecurity measures like firewalls, firewa lls, encryption, encry pfion, multi-factor mulfi -factor authentication, authentication, and and security securify awareness training. AA lack awareness training. lack of these of these protections protections makes targets mo kes to rgefs more vulnerable to more vulnerable to attacks. attacks. Example: Phishing attacks often succeed because they they torget target users who who aare re unaware unaware of of security practices (suitable target) and (suifoble target) and lack strong cybersecurity cybersecurity defenses (absence ofof capable guardian), copoble guordio n), aallowing homing a motivated offender toto easily exploit them. them. SOCIAL LEARNING THEORY Social Learning Theory is often combined with the cognitive learning theory which theorizes that learning is influenced by psychological psycholoqical factors and and behavioral learning learninq based on responses to to environmental environmental stimuli. stimuli. For For this this theory to imply, imply, there are are four four key key requirements requirements for learning: forlearninq: 1. 1. Observation Observation (environmental) 2. Retention (cognitive) 3. Reproduction (cognitive) 4. 4. Motivation Motivation EXAMPLE OF SOCIAL LEARNING THEORY 0Observation bservotion (Environmental): Cybercriminals (Environ mento I): Cybe rcriminals often learn by by observing others in online onl ine environments, envi ronments, such as as hacking ha cking forums, fo rums,ddark a rk web web marketplaces, mar ketp laces, or social sociaI media med iapplatforms latfo rms where cybercrime cybercrime techniquesa techniques are reddiscussed iscussed and and ddemonstrated. emonstrated. Retention (Cognitive): (C og nitive): After observing criminal criminaI behavior, the individual individuaI must retain this information. This involves remembering rememb ering thethe steps, techniques, and steps, techniques, and strategies strat eg ies involved in committing committing cybercrimes, cybercrimes, which are a re stored in memory for fo r future use. Reproduction Reproduction (Cognitive): The observed (Cog nitive): The observed and and retained retained bbehavior ehavior must must be translated into be translated into aaction. This involves ction. This the involves the aability to replicate the bility to the crimina criminal techniques learned I techniques iearned from others, which may may require requireppractice ractice and and refinement. Motivation: The key Motivation: The to whether key to the individual whether the individuaI will wilI actually commit the a ctual ly commit the cybercrime. cybercrime. Motivation can stem Motivation can from stem from various factors, various factors, including including financial financial gain, go in,a ad desire esire for for recognition recognition inin hacker communities, or hacker communities, or ideological ideo logical reasons. rea sons. EXAMPLE OF SOCIAL LEARNING THEORY AA young young individual individual interested interested in technology stumbles in technology stumbles upon upon a a hacking forum where hacking forum where cybercriminal I activities are cybercrimina are regularly discussed and and demonstrated (Observation). They become become intrigued intrigued and and start following tutorials start following tutorials on on hacking techniques, storing hacking techniques, this information storing this information for for future use use (Retention). After After learning thethe basics, they they start experimenting with with hacking tools, attempting tools, attempting to to replicate replicate what they have what they have learned learned (Reproduction). Their motivation (Reproduction). Their motivation is is driven driven by the potential by the financial rewards potential financial rewa rds of of selling selling stolen stolen data data and the thrill and fhe thrill of of outsmarting outsma rfing security security systems systems (Motivation). (Motivation). Eventually, this individual Eventually, this successfully executes individuaI successfully executes a cyber attack, a cyber attack, having having fully fully internalized internalized and and acted acted on the behaviors on the they observed behaviors they observed and and learned. learned. VICTIM PARTICIPATION THEORY targets for crime by Victim Participation Theory holds that certain victims make themselves tarqets engaging enqaqinq in actions that are confrontational or risky (active): (active); or or by by simply being beinq present in ina a location that provides aa motivated offender with the opportunity to commit an offense (passive); or (passive): or by by engaging enqaqinq provocative provocative behavior behavior in ina a criminogenic criminoqenic environment. environment. The The victim victim may may knowingly knowingly act act in ina a provocative provocative manner, manner, uses fighting words uses fighting words or threats, or orthreats, or attacks attacks first. first. The The victim victim can can display display specific specific attributes, attributes, characteristics, characteristics, or or mannerism mannerism that that unknowingly unknowingly motivates motivates or or threatens threatens the the attacker. attacker. Victim Victim precipitation precipitation may may exist when an exist when an individual individual is is part part of of aa particular particular group group that that offends offends oror threatens threatens someone’s someone's political, political, social, social, and and economic economic security, security, status status oror reputation. reputation. EXAMPLE OF VICTIM PARTICIPATION THEORY Active Active Par ticipation: Participotio n: In In some cases, victims some cases, victims might might unintentionally unintentionally ffacilitate cybercrimes through acilit ate cybercrimes through their their actions. actions. For For example, clicking on exampie, clicking on aa malicious malicious link link or or downloading down loading anan unverified unverif ied attachment can result attachment can result in in aa malware ma lwa re infection, infection, leading to data leading to data breaches breaches ororffinancial inanciaI loss. loss. Passive Passive Par ticipation: Participotio Victims might n: Victims might also also contribute to their contribute to their victimization victimization by by neglecting neglecting basic basic cybersecurity practices, cybersecurity practices, such such as as using weak using weo k passwords, passwords, not not updating updating software, softwo re, or or ignoring security ignoring security warnings. This passive participation wa rnings. This can make pa rticipafion con them more vulnerable mo ke them vulnerable fo to cyberaffocks. cyberattacks. Example: Example:AA user who shares too who shares too much personal personaI information onon social social media might become a target target for for social engineering attacks like phishing. Their active sharing sha ring of of personal personaI data (active participation) pa rticipotion) and and failure to failure to adjust privacy settings (passive (pa ssive participation) contribute to pa rticipotion) contribute to their their victimization. victimization. CYBERCRIMES VS TRADITIONAL CRIME There There are are some some studies studies that suggest sugqest that cybercrime cybercrime offenders offenders have have the samesame demographics demoqraphics as traditional traditional offenders. Cybercriminals, for example, are more likely to to be be men men There There are are limitations limitations to to the the usage usaqe and and potential potential benefits benefits offered offered by by cyber cyber criminology. criminoloqy. For For example, example, the absence absence ofof robust robust evidence evidence about about the extent, extent, role, role, and and nature nature of of criminal criminal actors actors in in cyber cyber space space impedes impedes the the development development ofof sound sound countermeasures countermeasures Other limitations offered by researchers focus of the argument arqument that cybercrime is not not an an entirely new new form of of contemporary and/or innovative genre qenre of of crime. For example, most of the of the cybercrime wewe see today simply represents the migration miqration of traditional traditional crime to cyberspace where cybercriminals use use available technoloqy technology to commit old crimes in new oldcrimes new ways CRIMINOLOGY Watch this video! What is Criminology? CriminologY?AA Crash Course CYBER HARASSMENT The use use of of digital technology has become an diqital technoloqy an integral inteqral part of our our lives. Any Any technology technoloqy can can be used for for constructive or destructive purposes. Misuse of of information andand communication communication technology technoloqy is an an important ingredient inqredient of Cyber Crime. Among Amonq many offensive acts in cyberspace, cyberspace, online abuse/ harassment isisa a common phenomenon that directly or indirectly affects cyberspace users of diverse age aqe groups. qroups. Cyber Cyber Harassment Harassment isis defined defined as asaa repeated, repeated, unsolicited, unsolicited, hostile hostile behavior behavior by byaa person through person throuqh cyberspace cyberspace with withaa intent intent to to terrify, intimidate, intimidate, humiliate, threaten, humiliate, threate n, harass harass or or stalk stalk someone. someone. Any Any harassment harassment caused caused through through electronic electronic media media is is considered considered to to have haveaa similar similar impact impact as as traditional traditional offence offence of of harassment. harassment. It It can can be be done done through through various various means means of ICT as depicted. ofICTasdepicted. CATEGORIES OF CYBER HARASSMENT Cyber Cyber Cyber bullying Teasing Stalking CYBERBULLYING Cyberbullying is an an act act of of sending, sendinq, posting postinq or sharing sharinq negative, neqative, harmful, false or demeaning demeaninq content regarding reqardinq others. Sharing Sharinq personal or private information information which could cause embarrassment oror humiliation humiliation to others too falls under the ambit of of Cyberbullying. Cyberbullyinq. It It takes place place through through digital diqital devices devices such such as as cell cell phones, phones, computers, computers, and and tablets tablets via services services such such as as SMS, SMS, texts, texts, Apps, Apps, social social media media platforms, platforms, online on line forums and and gaming gaming where where people people can can view, participate participate or share content. EXAMPLES OF CYBERBULLYING Posting Postinq nasty or humiliating humiliatinq content or or comments about an individual online Publishing Publishinq an an embarrassing embarrassinq or demeaning demeaninq photo or video orvideo Creating Creatinqaa fake profile of another individual individual Online threats provoking provokinq an individual individual to harm/kill harm/hill himself or hurt someone else Triggering religious, religious, racial, racial, regional, regional, ethnic eth nic or political vitriol online by posting hate comments comments or content orcontent EXAMPLES OF CYBERBULLYING Using Usinq other’s other's identity identity online to ask on line to for or ask for or post post personal personal or fake, demeaning,

Use Quizgecko on...
Browser
Browser