Skip to main content

What is Cyber crime? Meaning & Terminologies

 What is Cyber crime? Meaning & Terminologies

What is cyber crime?

Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.

There are many privacy concerns surrounding Cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cyber-crimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyber warfare. Warren Buffet describes Cybercrime as the "number one problem with mankind" and "poses real risks to humanity."

A report (sponsored by McAfee) published in 2014 estimated that the annual damage to the global economy was $445 billion. A 2016 report by Cybersecurity ventures predicted that global damages incurred as a result of cybercrime would cost up to $6 trillion annually by 2021 and $10.5 trillion annually by 2025.

Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US. In 2018, a study by the Center for Strategic and International Studies (CSIS), in partnership with McAfee, concludes that nearly one percent of global GDP, close to $600 billion, is lost to cybercrime each year. The World Economic Forum 2020 Global Risk report confirmed that organized Cybercrimes bodies are joining forces to perpetrate criminal activities online while estimating the likelihood of their detection and prosecution to be less than 1 percent in the US.

Terminologies in cyber world 

Cyber crime is rapidly evolving, as is the terminology used to describe it. The following are commonly used terms that relate to cyber crime.

Back door: A way to access an electronic system by bypassing some or all security mechanisms.

Blog: An online journal. Contraction of the term “web log.”

Bot: A software robot that performs automated tasks.

Browser: A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.

Cookie: An information packet sent from a website to a web browser that records a user’s activity on that website.

Cyber bullying: The act of one individual harassing or intimidating another individual via the Internet.

Denial-of-Service (DoS) attack: A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.

Domain name: A unique Internet identifier registered to an entity (e.g. whitehouse.gov).

Email header: The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.

Firewall: Hardware and/or software designed to prevent unauthorized users from accessing a computer system.

Global Positioning System (GPS): A satellite navigation system that identifies the precise location of the transmitting device.

Hacktivism: A politically- or ideologically-motivated cyber attack or hack.

Internet Protocol (IP) address: A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.

Internet Service Provider (ISP): A company that offers access to the Internet.

Login: A username and password used to identify an individual attempting to gain access to a restricted page or network.

Malware: Malicious software, such as a virus or a worm, that attacks a target computer.

Metadata: Amassed data that is used to describe large amounts of other Internet data.

Network: A group of computers that is linked to share data and other information.

Operating system: The overarching program that runs all the functions on a computer or other electronic device.

Password: A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.

Phishing: Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.

Search engine: A website that finds information across the Internet based on a set of search criteria.

Spam: Unsolicited advertising or other information sent out via email or other messaging service.

System administrator: An individual who manages and oversees a network.

Trojan: A program that masks something harmful, such as a worm or virus, that it carries into a device.

Webcam: A camera connected to a computer, generally used to then stream videos to the Internet.

Wireless hotspot: A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.

 


Comments

Popular posts from this blog

History of Cybercrime and It's Impact on Society

 History of Cybercrime and It's Impact on Society History of Cybercrime The malicious tie to hacking was first documented in the 1970s when early computerized phones were becoming a target. Tech-savvy people known as “phreakers” found a way around paying for long distance calls through a series of codes. They were the first hackers, learning how to exploit the system by modifying hardware and software to steal long distance phone time. This made people realize that computer systems were vulnerable to criminal activity and the more complex systems became, the more susceptible they were to cybercrime. Fast Forward to 1990, where a large project named Operation Sundevil was exposed. FBI agents confiscated 42 computers and over 20,000 floppy disks that were used by criminals for illegal credit card use and telephone services. This operation involved over 100 FBI agents and took two years to track down only a few of the suspects. However, it was seen as a great public relations effort,

Common Computer and Internet Cyber Crimes

 Common Computer and Internet Cyber Crimes The Internet can be a scary place, full of scammers, thieves, and saboteurs. If you think that sounds like an exaggeration, consider this statistic: According to the Norton Cyber Security Insights Report, over 143 million Americans have been affected by computer crimes in the last year, with 80% of those surveyed reporting they or someone they knew had been victimized. With the ubiquity of smartphones and social media reporting our every move, it’s no surprise that cyber-crime is on the rise. From theft to fraud to solicitation, here are nine common Internet crimes that are impacting Americans today. 1. Phishing Phishing is when criminals send fraudulent emails pretending to be from legitimate businesses, in an attempt to collect sensitive, personal information. Often, any links in the email will redirect to a website owned by the scammer, so always be careful about what information you give out on the Internet. 2. Harassment Cyberstalkers use