Use Sophia to knock out your gen-ed requirements quickly and affordably. Learn more
×

Cybercrime

Author: Sophia

what's covered
In this lesson, you will learn about different types of cybercrime and their prevalence in society in order to define the crimes that fall under this typology and understand their patterns. Specifically, this lesson will cover:

Table of Contents

1. Cybercrime: Definitions and Patterns

Cybercrime refers to criminal activities that are carried out using digital technology or the internet. These crimes can take various forms, and they continue to evolve as technology advances. There are many types of cybercrime, and we will discuss some of the more common forms in this lesson. It can be difficult to determine the amount of cybercrime due to its global nature, lack of standardized reporting, and the ability to conceal one’s identity in cyberspace, among other challenges.

term to know
Cybercrime
Criminal activities that are carried out using digital technology or the internet.

1a. Phishing

Phishing is a type of cyberattack in which attackers attempt to deceive people into disclosing sensitive information, such as login credentials, personal details, or financial information. The attackers often pretend to be trustworthy entities, such as banks, government agencies, or reputable companies, to trick the victims into providing this information. Phishing is one of the most common types of cybercrime. In 2022, approximately 300,000 people in the United States fell victim to a phishing attack (Petrosyan, 2023).

Phishing attacks typically involve the use of emails, messages, or websites that appear legitimate, often replicating the look of authentic communication from a trusted source. These messages usually contain language to create a sense of urgency or fear, prompting the recipient to act quickly without thoroughly verifying the authenticity of the communication.

Phishing is a widespread and evolving threat, and people and organizations need to be vigilant to avoid falling victim to these scams. Security measures, such as using two-factor authentication, regularly updating passwords, and being cautious about clicking on links or providing personal information, can help avoid the risks associated with phishing attacks.

term to know
Phishing
A cyberattack in which attackers attempt to deceive people into disclosing sensitive information, such as login credentials, personal details, or financial information.

1b. Hacking

Hacking has different meanings depending on the context, but in a general sense, it refers to the act of gaining unauthorized access to computer systems or networks, typically with the goal of exploiting vulnerabilities for malicious purposes. Hacking can involve various activities, such as breaking into computer systems or networks without permission or taking advantage of weaknesses in software, hardware, or security protocols. It is often associated with malicious activities, such as stealing sensitive information or disrupting operations.

EXAMPLE

In 2022, there was a cyberattack on Crypto.com, targeting nearly 500 people’s cryptocurrency accounts. Hackers stole approximately $18 million worth of Bitcoin and $15 million worth of Ethereum, among other cryptocurrencies. They were able to bypass the two-factor authentication and access the users’ accounts. After this attack, Crypto.com reimbursed users who were affected. They also heightened security for their systems to prevent the likelihood of this type of attack happening in the future (LeClerc Sveinsson, n.d.).

It is important to note that not all hacking is malicious. There are ethical hackers who use their skills to identify and fix security vulnerabilities. They work to improve security and help protect systems from malicious hackers.

term to know
Hacking
An act of gaining unauthorized access to computer systems or networks, typically with the goal of exploiting vulnerabilities for malicious purposes.

1c. Malware

Malware, or malicious software, refers to any software designed to harm computer systems, networks, or users. It is often installed by hackers. In 2022, there were over 5.5 billion malware attacks around the world (Petrosyan, 2024). Malware is a broad term that encompasses various types of malicious software, each with its own set of functions and purposes. Malware can take many forms, including viruses, worms, Trojans, ransomware, spyware, adware, and more.

Here is a brief overview of some common types of malware:

Type Definition
Viruses These are programs that can replicate themselves by attaching to other programs or files. They often spread through infected files and can damage or corrupt data.
Worms These are self-replicating programs that can spread across networks without any human intervention. They can consume a system's resources, leading to performance issues.
Trojans These are programs that disguise themselves as legitimate software but contain malicious code. Once installed, they can perform a variety of harmful actions, such as stealing sensitive information or providing unauthorized access to a system.
Ransomware This is a program that encrypts the victim's files and demands a ransom in exchange for the decryption key. Its attacks can have severe consequences, as they can lead to data loss and financial damage.
Spyware This is a program that is designed to spy on the user's activities without their knowledge. It can capture keystrokes, take screenshots, and collect information, which is then sent to a remote server.
Adware This is a program that displays unwanted advertisements on a user's computer, often in the form of pop-ups. While not always harmful, it can be annoying and may impact system performance.

Malware is typically distributed through malicious email attachments, infected websites, and compromised software downloads. To protect against malware, it is important to use antivirus and anti-malware software, keep software and operating systems up to date, and exercise caution when clicking on links or downloading files from the internet.

terms to know
Malware
Software designed to harm computer systems, networks, or users.
Virus
A program that can replicate itself by attaching to other programs or files.
Worm
A self-replicating program that can spread across networks without any human intervention.
Trojan
A type of malware that disguises itself as legitimate software but contains malicious code.
Ransomware
A type of malware that encrypts the victim's files and demands a ransom in exchange for the decryption key.
Spyware
Software that spies on the user's activities without their knowledge.
Adware
A type of malware that displays unwanted advertisements on a user's computer, often in the form of pop-ups.

1d. Identity Theft

Identity theft, or online identity theft, is a type of crime in which an individual's personal information is stolen and used for fraudulent purposes in cyberspace. This stolen information can include the person's name, Social Security number, credit card details, bank account information, passwords, and other sensitive data. The Federal Trade Commission received over 1.1 million reports of identity theft in 2022 (Lever, 2023).

EXAMPLE

Abraham Abdallah fooled credit score companies into providing him with information in 2001. He then used the identities of some of the country’s richest people, including Warren Buffet and Steven Spielberg, to steal millions of dollars (DataShield, n.d.).

People who engage in identity theft typically use the stolen information to commit fraudulent activities, such as financial fraud, medical identity theft, criminal activity, or tax fraud. Here are some ways to reduce the risk of falling victim to cyber identity theft:

  • Protecting personal information
  • Using strong and unique passwords
  • Being cautious about sharing sensitive data online
  • Regularly monitoring financial statements
Additionally, organizations often implement security measures and encryption to protect customer data and prevent unauthorized access.

term to know
Identity Theft
A type of crime in which an individual's personal information is stolen and used for fraudulent purposes in cyberspace.

1e. Cyberbullying

Cyberbullying refers to the use of digital technologies, social media, or smartphones to harass, intimidate, or harm individuals. It involves the use of electronic communication to bully someone, often repeatedly and with the intention of causing emotional distress or embarrassment. Young people are often on social media and other digital technologies and are the most likely to experience cyberbullying. A recent poll indicates that almost 60% of teens have been the victim of cyberbullying (Anderson, 2018).

EXAMPLE

Fifteen-year-old Nate Bronstein, a student in Chicago, was the victim of relentless cyberbullying by his classmates. They sent him texts and Snapchats encouraging him to kill himself. As a result, he took his own life (Hickey, 2022).

It is important to note that cyberbullying is not always a crime. However, it can escalate to criminal activity in some situations where harassment or stalking have gone too far. It can also be a crime when it is associated with hate crimes, which we discussed in the previous lesson.

Cyberbullying can have serious consequences, including emotional and psychological distress for the victims. To prevent and address this issue, it is essential to raise awareness about cyberbullying, promote digital literacy, and encourage positive online behavior.

term to know
Cyberbullying
The use of digital technologies, social media, or smartphones to harass, intimidate, or harm individuals.

summary
In this lesson, you learned about the complex definitions and patterns of cybercrime. There are so many types of cybercrime, and it is hard to know the nature and extent of this type of crime. Moreover, it is a crime that is easy to commit because it is easy to conceal one’s identity online. Some types of cybercrime attempt to get access to people’s information online. There is an overlap among many of these terms, but they are all unique in their own ways.

First, you learned that phishing is a type of cybercrime meant to deceive people into disclosing sensitive information, such as login credentials or other personal information. By hacking, individuals gain unauthorized access to computer systems or networks, usually for malicious purposes. There are different types of software that hackers use to harm computer systems, networks, or users. Malware can take various forms, including Trojans, worms, and adware. Additionally, you learned about identity theft and how people’s personal information can be stolen and used for a variety of fraudulent purposes in cyberspace.

Cybercrime can also be used to harm individuals in different ways. One type of cybercrime that primarily affects young people is cyberbullying. Digital platforms have given people new ways to bully others, and this can have detrimental effects on young people. As you can see, cybercrime has permeated society, and it is important for people and companies to take steps to protect their accounts and passwords, install antivirus software, and keep their systems up to date. It is also important for parents to talk to their children about the harm they could face as a result of their internet use. In a future lesson, we will examine in more depth how cybercrime has impacted the criminal justice system.

In the next lesson, we will continue discussing crime typologies, but we will shift our focus to organized crime.

Source: THIS TUTORIAL HAS BEEN ADAPTED FROM KWANTLEN POLYTECHNIC UNIVERSITY’S “INTRODUCTION TO CRIMINOLOGY.” ACCESS FOR FREE AT kpu.pressbooks.pub/introcrim/. LICENSE: CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL.

REFERENCES

Anderson, M. (2018, September 27). A majority of teens have experienced some form of cyberbullying. Pew Research Center: Internet, Science & Tech. www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/

DataShield (n.d.). Five worst cases of identity theft ever. datashieldcorp.com/5-worst-cases-of-identity-theft-ever/

Hickey, M. (2022, April 5). A 15-year-old boy died by suicide after relentless cyberbullying, and his parents say the Latin school could have done more to stop it. CBS News. www.cbsnews.com/chicago/news/15-year-old-boy-cyberbullying-suicide-latin-school-chicago-lawsuit/

LeClerc Sveinsson, R. (n.d.). Top 10 data breaches so far in 2022. ERMProtect. ermprotect.com/blog/top-10-data-breaches-so-far-in-2022/

Lever, R. (2023, September 12). U.S. News & World report identity theft survey 2023. U.S. News. www.usnews.com/360-reviews/privacy/identity-theft-protection/identity-theft-fraud-survey

Petrosyan, A. (2023, August 29). Most reported cybercrime in the U.S. 2022, by number of individuals affected. Statista. www.statista.com/statistics/184083/commonly-reported-types-of-cyber-crime-us/#:~:text=In%202022%2C%20the%20most%20common,the%20IC3%20during%20that%20year

Petrosyan, A. (2024, January 10). Malware - Statistics & facts. Statista. www.statista.com/topics/8338/malware/#topicOverview

Terms to Know
Adware

A type of malware that displays unwanted advertisements on a user's computer, often in the form of pop-ups.

Cyberbullying

The use of digital technologies, social media, or smartphones to harass, intimidate, or harm individuals.

Cybercrime

Criminal activities that are carried out using digital technology or the internet.

Hacking

An act of gaining unauthorized access to computer systems or networks, typically with the goal of exploiting vulnerabilities for malicious purposes.

Identity Theft

A type of crime in which an individual's personal information is stolen and used for fraudulent purposes in cyberspace.

Malware

Software designed to harm computer systems, networks, or users.

Phishing

A cyberattack in which attackers attempt to deceive people into disclosing sensitive information, such as login credentials, personal details, or financial information.

Ransomware

A type of malware that encrypts the victim's files and demands a ransom in exchange for the decryption key.

Spyware

Software that spies on the user's activities without their knowledge.

Trojan

A type of malware that disguises itself as legitimate software but contains malicious code.

Virus

A program that can replicate itself by attaching to other programs or files.

Worm

A self-replicating program that can spread across networks without any human intervention.