-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathcybercimes.html
133 lines (122 loc) · 10.1 KB
/
cybercimes.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
<!doctype html>
<html>
<!--This example uses the default bootstrap stylesheet-->
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css"
integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous">
<!--provides a full-width container that can expand or collapse based on the size of viewport-->
<body>
<div class="container-fluid">
<div class="row">
<div class="col-md-2 col-sm-12 col-xs-12">
<nav id="navbar">
<h3>Cyber Crimes
</h3>
<!--content stacking for smaller screens-->
<ul class="nav nav-pills nav-stacked">
<!--internal linking to the respective sections-->
<a class="nav-link" href="#Introduction" rel="internal">
<li>Introduction</li>
</a>
<a class="nav-link" href="#Basic_Cybercrimes" rel="internal">
<li>Basic Cybercrimes</li>
</a>
<a class="nav-link" href="#What_you_should_already_know" rel="internal">
<li>Classification of cyber crime</li>
</a>
<a class="nav-link" href="#About_Topic" rel="internal">
<li>Prevention</li>
</a>
<a class="nav-link" href="#Example_of_cybercrimes" rel="internal">
<li>Examples of cyber crime</li>
</a>
</ul>
</nav>
</div>
<div class="col-md-10 col-sm-12 col-xs-12">
<main id="main-doc">
<section class="main-section" id="Introduction">
<!--basic styling for the headings, better practice to do the same in a css file as the styling is same for all headers-->
<h3 style="background: black; color: white">Introduction</h3>
<article>
<p>Cyber Crime or a computer-oriented crime is a crime that includes a computer and a
network. The computer may have been used in the execution of a crime or it may be the
target. Cybercrime is the use of a computer as a weapon for committing crimes such as
committing fraud, identity theft, or breaching privacy. Cybercrime, especially through
the Internet, has grown in importance as the computer has become central to every field
like commerce, entertainment, and government. Cybercrime may endanger a person or a
nation’s security and financial health.
</p>
</article>
</section>
<section class="main-section" id="Basic_Cybercrimes">
<h3 style="background: black; color: white">Basic Cybercrimes</h3>
<article>
<li>Stolen credit card information</li>
<li>Hacking into a government website:</li>
<li>Theft of user accounts</li>
<li>Compromised IoT devices</li>
<li>Loss of control and access to content</li>
<li>Phishing campaigns</li>
<p>Some other common examples of cybercrimes include the sale of illegal items, such as
drugs, arms, or counterfeit goods, illegal gambling, solicitation, production,
distribution, etc.</p>
</article>
</section>
<section class="main-section" id="What_you_should_already_know">
<h3 style="background: black; color: white">Classification of Cyber Crimes</h3>
<article>
<p>Cybercrime encloses a wide range of activities, but these can generally be divided into
two categories:</p>
<ol>
<li>Crimes that aim at computer networks or devices. These types of crimes involve
different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.</li>
<li>Crimes that use computer networks to commit other criminal activities. These types
of crimes include cyber stalking, financial fraud or identity theft.</li>
</ol>
<!--creating list using html-->
<li>Cyber Terrorism</li>
<li>Cyber Extortion</li>
<li>Cyber Warfare</li>
<li>Internet Fraud</li>
<li>Cyber Stalking</li>
</article>
</section>
<section class="main-section" id="About_Topic">
<h3 style="background: black; color: white">Prevention of Cyber Crimes</h3>
<article>
<p>Below are some points by means of which we can prevent cyber crime: </p>
<!--creating list using html-->
<li>Use strong password</li>
<li>Use trusted antivirus in devices</li>
<li>Keep social media private</li>
<li>Keep your device software updated</li>
<li>Use secure network</li>
<li>Never open attachments in spam emails</li>
<li>Software should be updated</li>
</article>
</section>
<section class="main-section" id="Examples of Cyber crimes">
<!--basic styling for the headings, better practice to do the same in a css file as the styling is same for all headers-->
<h3 style="background: black; color: white">Examples of Cyber Crimes</h3>
<article>
<h4><strong>Malware attack</strong></h4>
<p>
A malware attack is where a computer system or network is infected with a computer virus or other type of malware. A computer compromised by malware could be used by cybercriminals for several purposes. These include stealing confidential data, using the computer to carry out other criminal acts, or causing damage to data.A famous example of a malware attack was the WannaCry ransomware attack, a global cybercrime committed in May 2017. WannaCry is a type of ransomware, malware used to extort money by holding the victim’s data or device to ransom. The ransomware targeted a vulnerability in computers running Microsoft Windows. When the WannaCry ransomware attack hit, 230,000 computers were affected across 150 countries. Users were locked out of their files and sent a message demanding that they pay a Bitcoin ransom to regain access. Worldwide, the WannaCry cybercrime is estimated to have caused $4 billion in financial losses. To this day, the attack stands out for its sheer size and impact.
</p>
<h4><strong>Phishing</strong></h4>
<p>
A phishing campaign is when spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security. Phishing campaign messages may contain infected attachments or links to malicious sites, or they may ask the receiver to respond with confidential information.A famous example of a phishing scam took place during the World Cup in 2018. According to our report, 2018 Fraud World Cup , the World Cup phishing scam involved emails that were sent to football fans. These spam emails tried to entice fans with fake free trips to Moscow, where the World Cup was being hosted. People who opened and clicked on the links contained in these emails had their personal data stolen. Another type of phishing campaign is known as spear-phishing. These are targeted phishing campaigns which try to trick specific individuals into jeopardizing the security of the organization they work for.
Unlike mass phishing campaigns, which are very general in style, spear-phishing messages are typically crafted to look like messages from a trusted source. For example, they are made to look like they have come from the CEO or the IT manager. They may not contain any visual clues that they are fake.
</p>
<h4><strong>Distributed DoS attacks</strong></h4>
<p>
Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks.A DDoS attack overwhelms a system by using one of the standard communication protocols it uses to spam the system with connection requests. Cybercriminals who are carrying out cyberextortion may use the threat of a DDoS attack to demand money. Alternatively, a DDoS may be used as a distraction tactic while another type of cybercrime takes place. A famous example of this type of attack is the 2017 DDoS attack on the UK National Lottery website. This brought the lottery’s website and mobile app offline, preventing UK citizens from playing. The reason behind the attack remains unknown, however, it is suspected that the attack was an attempt to blackmail the National Lottery.
</p>
</article>
</section>
</main>
</div>
</div>
</div>
</body>
</html>