How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
Edward Snowden leaked documents revealing the NSA was conducting mass surveillance programs like PRISM to collect data on American and foreign citizens. This raised debates on privacy violations versus national security. The document argues mass surveillance is justified for precautionary reasons in dealing with cyber threats from non-state actors and hostile states that exploit ambiguity. It also claims targeted surveillance would be ineffective given how cyber attacks can emerge from anywhere without links to sponsors. While revealing secret programs, mass surveillance has been publicly known and legally permitted for decades through laws like the Patriot Act.
This document provides a summary of a lecture on cyber crimes meant to illustrate the types of online crimes occurring and why more cyber crime attorneys are needed. The lecture begins with an overview of four categories of cyber crimes: 1) "Classic" crimes focusing on hardware/networks, 2) Internet fraud crimes, 3) content/substance crimes, and 4) cyber incidents. It then delves into examples of crimes in the first category, including theft of services, computer intrusions by various actors, and computer viruses, worms, and malware. Throughout, it emphasizes the diversity, challenges, and increasing scale of cyber crimes.
Makalah cyber crime dalam Bahasa Inggris dan Indonesiakorneliszalukhu
The document summarizes a case of alleged cyberstalking between two individuals, Antarestawati and Khoiriatul Masruroh, in Malang, Indonesia. Antarestawati, a doctor, uploaded a photo of Khoiriatul to a WhatsApp group along with a caption implying she was a prostitute. Feeling harassed, Khoiriatul reported the matter to police. Under Indonesia's ITE Law, Antarestawati faced up to 6 months in prison or a fine for violating decency and defamation. Both parties later reconciled and withdrew the complaint after signing a letter and paying a fine. The document also provides background on cybercrime and cyberstalk
Assignment of cyber crimes for oumh1203Faridah Husin
This document discusses cyber crimes in Malaysia and the United States. It begins with an introduction that defines cyber crime and its scope. It then covers classifications of cyber crimes such as those against individuals, property, organizations, and society. The document compares cyber crimes between Malaysia and the US, noting that the US leads in identity theft and phishing while Malaysia's most common crimes are malware, scams, and mobile threats. It concludes with suggestions on curbing cyber crimes such as education, using firewalls and security software, practicing safe online behavior, and using strong passwords.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Edward Snowden leaked documents revealing the NSA was conducting mass surveillance programs like PRISM to collect data on American and foreign citizens. This raised debates on privacy violations versus national security. The document argues mass surveillance is justified for precautionary reasons in dealing with cyber threats from non-state actors and hostile states that exploit ambiguity. It also claims targeted surveillance would be ineffective given how cyber attacks can emerge from anywhere without links to sponsors. While revealing secret programs, mass surveillance has been publicly known and legally permitted for decades through laws like the Patriot Act.
This document provides a summary of a lecture on cyber crimes meant to illustrate the types of online crimes occurring and why more cyber crime attorneys are needed. The lecture begins with an overview of four categories of cyber crimes: 1) "Classic" crimes focusing on hardware/networks, 2) Internet fraud crimes, 3) content/substance crimes, and 4) cyber incidents. It then delves into examples of crimes in the first category, including theft of services, computer intrusions by various actors, and computer viruses, worms, and malware. Throughout, it emphasizes the diversity, challenges, and increasing scale of cyber crimes.
Makalah cyber crime dalam Bahasa Inggris dan Indonesiakorneliszalukhu
The document summarizes a case of alleged cyberstalking between two individuals, Antarestawati and Khoiriatul Masruroh, in Malang, Indonesia. Antarestawati, a doctor, uploaded a photo of Khoiriatul to a WhatsApp group along with a caption implying she was a prostitute. Feeling harassed, Khoiriatul reported the matter to police. Under Indonesia's ITE Law, Antarestawati faced up to 6 months in prison or a fine for violating decency and defamation. Both parties later reconciled and withdrew the complaint after signing a letter and paying a fine. The document also provides background on cybercrime and cyberstalk
Assignment of cyber crimes for oumh1203Faridah Husin
This document discusses cyber crimes in Malaysia and the United States. It begins with an introduction that defines cyber crime and its scope. It then covers classifications of cyber crimes such as those against individuals, property, organizations, and society. The document compares cyber crimes between Malaysia and the US, noting that the US leads in identity theft and phishing while Malaysia's most common crimes are malware, scams, and mobile threats. It concludes with suggestions on curbing cyber crimes such as education, using firewalls and security software, practicing safe online behavior, and using strong passwords.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document discusses cybercrime and provides information on various related topics. It begins with definitions of cybercrime and descriptions of some notorious cybercriminals. Statistics on the top 20 countries for cybercrime are presented from a Symantec report. Cyber attacks are analyzed based on motivation and technique. The document also summarizes the major Bangladesh Bank cyber heist in 2016 and the security and policy implications. Finally it outlines some common cyber security measures.
This document discusses cybercrime in Iraq. It begins with definitions of cybercrime and various types of cybercrimes such as hacking, theft, cyber stalking, and identity theft. It then analyzes cybercrime statistics and cases in Iraq between 2006-2011, finding that cases increased by an average of 246.2% annually. Common cybercrime types in Iraq are discussed, with many cases involving social media sites like Facebook. The document also examines cybercrime legislation in Middle Eastern countries and discusses the emerging threat of cyber terrorism from ISIS and their online recruitment efforts.
Cyber terrorism involves using computer networks to conduct terrorist activities and cause disruption. It is defined as using computer networks to intimidate people or cause harm for social, political, or ideological goals. Cyber terrorism can threaten infrastructure and lives through online attacks, with risks including less chances of getting caught and difficulties tracking perpetrators due to network anonymity.
This document is a report submitted to India Insure Risk Management and Insurance Broking Services Pvt. Ltd. by Sayali Sawant for her internship project analyzing the feasibility of a cyber crime and insurance policy. The report was completed under the guidance of Mr. Manish Parikh from April 1st to June 30th, 2015. It includes an acknowledgements section, table of contents, literature review on cyber crime risks, definitions of different types of cyber crimes, and an analysis of cyber crime insurance policies and how they can help organizations mitigate risks from cyber attacks.
[Exposicion] Computer and Internet CrimeGerman Teran
Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?
Create another jurisdiction?
This document summarizes a presentation on cybercrime and its impact in Bangladesh. It discusses the types of cybercrimes like hacking and viruses, as well as the profiles of cybercriminals. The document outlines the impacts of cybercrime on individuals, organizations, and society through crimes like identity theft, fraud, and harassment. It also discusses Bangladesh's legal response to cybercrime through the ICT Act and the establishment of cyber tribunals. The conclusion acknowledges that while notable cybercrimes have yet to be committed in Bangladesh, increased technology usage raises the potential threat of future cybercrimes.
Cybercrime encompasses criminal acts committed using computers and networks. The document discusses the origin, methodology, and impact of cybercrime on individuals, organizations, and society. It provides reasons for cybercrime such as taking advantage of opportunities, accessibility of large amounts of data in one place, and lack of monitoring. Specific details are given about the prevalence and types of cybercrime in Bangladesh, sources of information about cybercrime, and the Cyber Appellate Tribunal established to hear appeals related to cybercrime cases. The Bangladesh Bank heist is also mentioned.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
This document discusses the motivations behind cybercrimes and categorizes cyber attackers. It identifies the main categories of cyber attackers as insiders and outsiders, with insiders further divided into disgruntled employees, financially motivated insiders, and unintentional insiders. Outsiders include organized attackers such as terrorists, hacktivists, nation states, and criminal organizations, as well as hackers and amateurs. The motivations for cyber attacks are identified as political, economic, and social motivations. The risks from cyber attacks arise from inadvertent actions, deliberate harmful actions, and inaction. Understanding the motivations and categories of cyber attackers can help address the operational cybersecurity risks they pose.
The document discusses conventional crimes and cyber crimes. It defines conventional crime as acts that breach criminal law. Cyber crimes involve using computers as tools or targets to commit unlawful acts. Some key differences are the involvement of computers and virtual mediums in cyber crimes. Common cyber crimes include unauthorized access, data theft, viruses, hacking, cyber stalking, and cyber terrorism. Cyber criminals can be organized groups, hackers, or discontented individuals. The document provides detailed descriptions and examples of various cyber crimes.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
This document discusses various types of cyber crimes and their impacts. It begins by providing examples of common cyber crimes experienced by individuals, such as receiving phishing emails, downloading malware, or having accounts hacked. It then categorizes cyber crimes as those targeting individuals, property, or government. The document outlines specific types of cyber crimes like hacking, theft, stalking, and malware. It notes that cyber crimes cause significant economic damages globally, with the average cost per victim being $298. The United States experiences the highest costs of cyber crime of any country. Reasons why cyber criminals engage in these acts include financial gain, activism, and nation-state cyber warfare.
Hacking is a major cause of cyber crime. Cyber crime involves using computers or the internet to commit unlawful acts, where the computer is both a tool and a target. There are three main categories of cyber crime: crimes against persons like cyber bullying and harassment, crimes involving computers and networks like hacking and malware attacks, and crimes similar to traditional offenses conducted online. Hacking allows criminals to steal more information and commit fraud from farther distances, making them more difficult to control. Various motivations and characteristics drive different types of hackers. Over time, hacking has evolved from intellectual challenges to also include criminal activities.
This document discusses cyber terrorism, including its definition, history, examples, effects, and ways to counter it. Cyber terrorism is defined as using computers or networks to intentionally cause harm or further political/ideological goals. The document provides background on the evolution of terrorism and increased public interest in cyber terrorism in the late 1980s/1990s. Examples of cyber terrorism history from 1997-2001 are outlined. The major effects of potential cyber attacks on critical infrastructure like power systems, water supplies, air traffic control, and healthcare are described. The document concludes by mentioning the International Multilateral Partnership Against Cyber Threats and the US military's role in countering cyber terrorism.
Cyberterrorism poses serious threats such as damage to infrastructure and loss of life or property. It allows terrorists to operate remotely and gain intelligence while limiting their risk. Nations also use cyberattacks for military and technology gains, which could escalate tensions. Cyberterrorism causes disabilities of networks, financial losses, privacy invasions, and death. As the internet has expanded, so has cyberterrorism. It is difficult to detect remote attackers. Countries need stronger laws, security, and training to address this growing threat.
Cyber crime involves using computers or the internet to commit illegal acts. There are three main types of cyber crimes: those against individuals, like cyber harassment; those against property, such as hacking to steal data from companies; and those against government, including terrorists using the internet to plan attacks. As more financial transactions move online, cyber crimes are increasing and pose a threat to both individuals and organizations. Effective prevention requires education about cyber security risks.
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
This document discusses cybercrime and provides information on various related topics. It begins with definitions of cybercrime and descriptions of some notorious cybercriminals. Statistics on the top 20 countries for cybercrime are presented from a Symantec report. Cyber attacks are analyzed based on motivation and technique. The document also summarizes the major Bangladesh Bank cyber heist in 2016 and the security and policy implications. Finally it outlines some common cyber security measures.
This document discusses cybercrime in Iraq. It begins with definitions of cybercrime and various types of cybercrimes such as hacking, theft, cyber stalking, and identity theft. It then analyzes cybercrime statistics and cases in Iraq between 2006-2011, finding that cases increased by an average of 246.2% annually. Common cybercrime types in Iraq are discussed, with many cases involving social media sites like Facebook. The document also examines cybercrime legislation in Middle Eastern countries and discusses the emerging threat of cyber terrorism from ISIS and their online recruitment efforts.
Cyber terrorism involves using computer networks to conduct terrorist activities and cause disruption. It is defined as using computer networks to intimidate people or cause harm for social, political, or ideological goals. Cyber terrorism can threaten infrastructure and lives through online attacks, with risks including less chances of getting caught and difficulties tracking perpetrators due to network anonymity.
This document is a report submitted to India Insure Risk Management and Insurance Broking Services Pvt. Ltd. by Sayali Sawant for her internship project analyzing the feasibility of a cyber crime and insurance policy. The report was completed under the guidance of Mr. Manish Parikh from April 1st to June 30th, 2015. It includes an acknowledgements section, table of contents, literature review on cyber crime risks, definitions of different types of cyber crimes, and an analysis of cyber crime insurance policies and how they can help organizations mitigate risks from cyber attacks.
[Exposicion] Computer and Internet CrimeGerman Teran
Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?
Create another jurisdiction?
This document summarizes a presentation on cybercrime and its impact in Bangladesh. It discusses the types of cybercrimes like hacking and viruses, as well as the profiles of cybercriminals. The document outlines the impacts of cybercrime on individuals, organizations, and society through crimes like identity theft, fraud, and harassment. It also discusses Bangladesh's legal response to cybercrime through the ICT Act and the establishment of cyber tribunals. The conclusion acknowledges that while notable cybercrimes have yet to be committed in Bangladesh, increased technology usage raises the potential threat of future cybercrimes.
Cybercrime encompasses criminal acts committed using computers and networks. The document discusses the origin, methodology, and impact of cybercrime on individuals, organizations, and society. It provides reasons for cybercrime such as taking advantage of opportunities, accessibility of large amounts of data in one place, and lack of monitoring. Specific details are given about the prevalence and types of cybercrime in Bangladesh, sources of information about cybercrime, and the Cyber Appellate Tribunal established to hear appeals related to cybercrime cases. The Bangladesh Bank heist is also mentioned.
Cybercrime encompasses criminal acts using computers and networks, known as hacking, as well as traditional crimes conducted online like fraud and identity theft. Hacking is the unauthorized access of computer systems and networks, while hackers seek and exploit weaknesses. Common types of hacking include website, network, email, and password hacking. Identity theft involves personal information being stolen and used without permission, causing financial and reputational harm. Malicious software, or malware, is software designed to harm computers and users, and includes viruses, worms, adware, trojans, spyware and rootkits. Cyberstalking and harassment laws prohibit monitoring, threats, and gathering private information to threaten or harass individuals online. Theft involves taking property
This document discusses the motivations behind cybercrimes and categorizes cyber attackers. It identifies the main categories of cyber attackers as insiders and outsiders, with insiders further divided into disgruntled employees, financially motivated insiders, and unintentional insiders. Outsiders include organized attackers such as terrorists, hacktivists, nation states, and criminal organizations, as well as hackers and amateurs. The motivations for cyber attacks are identified as political, economic, and social motivations. The risks from cyber attacks arise from inadvertent actions, deliberate harmful actions, and inaction. Understanding the motivations and categories of cyber attackers can help address the operational cybersecurity risks they pose.
The document discusses conventional crimes and cyber crimes. It defines conventional crime as acts that breach criminal law. Cyber crimes involve using computers as tools or targets to commit unlawful acts. Some key differences are the involvement of computers and virtual mediums in cyber crimes. Common cyber crimes include unauthorized access, data theft, viruses, hacking, cyber stalking, and cyber terrorism. Cyber criminals can be organized groups, hackers, or discontented individuals. The document provides detailed descriptions and examples of various cyber crimes.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
This document discusses various types of cyber crimes and their impacts. It begins by providing examples of common cyber crimes experienced by individuals, such as receiving phishing emails, downloading malware, or having accounts hacked. It then categorizes cyber crimes as those targeting individuals, property, or government. The document outlines specific types of cyber crimes like hacking, theft, stalking, and malware. It notes that cyber crimes cause significant economic damages globally, with the average cost per victim being $298. The United States experiences the highest costs of cyber crime of any country. Reasons why cyber criminals engage in these acts include financial gain, activism, and nation-state cyber warfare.
Hacking is a major cause of cyber crime. Cyber crime involves using computers or the internet to commit unlawful acts, where the computer is both a tool and a target. There are three main categories of cyber crime: crimes against persons like cyber bullying and harassment, crimes involving computers and networks like hacking and malware attacks, and crimes similar to traditional offenses conducted online. Hacking allows criminals to steal more information and commit fraud from farther distances, making them more difficult to control. Various motivations and characteristics drive different types of hackers. Over time, hacking has evolved from intellectual challenges to also include criminal activities.
This document discusses cyber terrorism, including its definition, history, examples, effects, and ways to counter it. Cyber terrorism is defined as using computers or networks to intentionally cause harm or further political/ideological goals. The document provides background on the evolution of terrorism and increased public interest in cyber terrorism in the late 1980s/1990s. Examples of cyber terrorism history from 1997-2001 are outlined. The major effects of potential cyber attacks on critical infrastructure like power systems, water supplies, air traffic control, and healthcare are described. The document concludes by mentioning the International Multilateral Partnership Against Cyber Threats and the US military's role in countering cyber terrorism.
Cyberterrorism poses serious threats such as damage to infrastructure and loss of life or property. It allows terrorists to operate remotely and gain intelligence while limiting their risk. Nations also use cyberattacks for military and technology gains, which could escalate tensions. Cyberterrorism causes disabilities of networks, financial losses, privacy invasions, and death. As the internet has expanded, so has cyberterrorism. It is difficult to detect remote attackers. Countries need stronger laws, security, and training to address this growing threat.
Cyber crime involves using computers or the internet to commit illegal acts. There are three main types of cyber crimes: those against individuals, like cyber harassment; those against property, such as hacking to steal data from companies; and those against government, including terrorists using the internet to plan attacks. As more financial transactions move online, cyber crimes are increasing and pose a threat to both individuals and organizations. Effective prevention requires education about cyber security risks.
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
This presentation covers cyber crime, including an overview of cyber space and cyber crime, types and classifications of cyber crimes, causes behind cyber crimes, impacts on society, and methods of prevention. Specific cyber crimes discussed include hacking, identity theft, malware, and online scams. The presentation explains that cyber crime threatens individuals, organizations, and national security through financial fraud, data theft, and cyber attacks. It also notes the significant impacts of cyber bullying on youth. Lastly, the presentation outlines strategies countries like Bangladesh have taken to strengthen cyber security and combat cyber crime through legislation, enforcement, and educational initiatives.
This document is a technical report submitted by Nikhil Kumar Chaudhary on the topic of cyber crime and security. It includes an abstract, introduction, sections on what cyber crime means and different types of cyber crimes. It also discusses the threats of cyber crimes in India, trends in India, and ways to tackle cyber crimes. Tables and figures are included to illustrate country distributions of cyber crimes and the rise of cyber crimes in India.
Cyber crime is a growing problem as more activities move online. There are many types of cyber crimes, including hacking, identity theft, and cyberbullying. Cyber criminals operate in organized networks similar to businesses, with different roles like leaders, engineers, and money mules. They are motivated by profit and use various technical methods and resources to attack networks and systems. Governments struggle to combat cyber crime due to its global and anonymous nature online.
A Survey On Cyber Crime Information SecurityMichele Thomas
This document provides an overview of cybercrime and information security. It discusses how cybercrime has increased with greater internet usage and defines cybercrime as illegal acts conducted through computers. The document then examines common forms of cybercrime like malware, spam, phishing, hacking, cyber stalking, and fraud. It explores the causes of cybercrime and how crimes are executed through methods like infecting devices with malware, sending spam emails, engaging in phishing scams, hacking via code, and cyber stalking victims online and offline. The goal of information security is also discussed as protecting computer data and systems from unauthorized access.
Cyberterrorism involves using computer systems to disrupt or shut down critical national infrastructures like transportation and government operations. As countries rely more on computer systems, new vulnerabilities have emerged. Cyberterrorism is an attractive option for modern terrorists as it allows for large scale harm, psychological impact, and media attention while maintaining secrecy. While experts warn of possible cyber attacks crippling infrastructure systems, to date no confirmed acts of genuine cyberterrorism have occurred. National security and the IT industry are working to address this threat.
This document discusses cybercrime and various types of cybercrimes such as computer fraud, cyber extortion, cyberwarfare, crimes targeting individuals, and crimes targeting computer networks. It provides examples of different cybercrimes and highlights the importance of protecting personal information and computer security. The key challenges are that individuals and organizations of all sizes are vulnerable to cyber attacks, and that attitudes need to change to prioritize cyber security and incident detection.
Cyberterrorism involves unlawful attacks against computers, networks, and stored information to intimidate or influence governments for political or social goals. To qualify as cyberterrorism, an attack must result in violence, death, explosions, economic loss, or generate fear. Currently, there is no foolproof way to protect systems, but common methods include encryption, firewalls, and isolating classified systems. The issues with addressing cyberterrorism include differing laws between countries, lack of knowledge and training for law enforcement, and the ability to attack from anywhere in the world.
This document provides a review of cybercrime. It begins with definitions of crime and cybercrime. It then discusses several common types of cybercrimes like financial crimes, cyber pornography, drug trafficking, and cyber terrorism. It also examines cybercriminals and categorizes them from teenagers to professional hackers. The document analyzes data on the countries most affected by cybercrime. It concludes that cybercrime causes significant financial losses globally and emphasizes the importance of awareness and cybersecurity laws.
Cyber crime poses several challenges for law enforcement. Technically, it can be difficult to attribute crimes due to IP spoofing and anonymity tools. Software vulnerabilities are also common and enable theft of data. Legally, different countries have varying laws and evidence standards, complicating international investigations. Ethically, agencies must respect privacy and human rights while investigating digital crimes. Addressing these technical, legal and ethical challenges is crucial to effectively combat cyber crime.
Cybercrime refers to criminal acts that involve computers and networks. There are two categories of cybercrime - crimes that directly target computers, like viruses and denial of service attacks, and crimes that use computers/networks to enable other crimes, such as fraud, identity theft, and phishing scams. Experts define cybercrimes as offenses committed using technologies like the internet or mobile phones to intentionally harm victims. Governments are increasingly concerned with cyber terrorism and cyber warfare between nations.
Cyberterrorism poses a serious threat to national security. Critical infrastructure systems like energy, transportation, and communication networks are increasingly reliant on computer systems and therefore vulnerable to cyber attacks. A successful cyberterrorist attack could disrupt these systems and endanger people's lives, just like traditional acts of terrorism. While no large-scale cyberterrorist attacks have occurred, experts warn it is possible and preparations need to be made to defend against this emerging threat.
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government. Cybercrime detection methods and classification methods have came up with varying levels of success for preventing and protecting data from such attacks. Several laws and methods have been introduced in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study shows that there are many countries facing this problem even today and United States of America is leading with maximum damage due to the cybercrimes over the years. According to the recent survey carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S. dollars. This paper describes about the common areas where cybercrime usually occurs and the different types of cybercrimes that are committed today. The paper also shows the studies made on e-mail related crimes as email is the most common medium through which the cybercrimes occur. In addition, some of the case studies related to cybercrimes are also laid down
This document discusses cyber terrorism and the threats it poses. It provides background on past cyber attacks, such as Chinese hackers targeting US government sites in 1999 after a bombing in Belgrade. More recently, Bank of America may have been the victim of a cyber terrorism attack. The document examines the reality of cyber terrorism threats and discusses how terrorists may continue improving their cyber attack capabilities through emerging technologies. It also notes that while some critical systems have been isolated from networks, other infrastructure like subways and power grids remain vulnerable.
The document discusses pros and cons of cybercrime. It provides definitions of cybercrime as criminal activities conducted online using computers to harm others, such as hacking, stealing personal or business information, or distributing viruses. Cybercrime can threaten individuals, national security, and financial systems. Common cybercrimes mentioned include illegal file downloading, stealing money from bank accounts, and creating/distributing viruses. The document also discusses punishments under Pakistani law for various cybercrimes such as fines and imprisonment.
This document outlines the objectives and topics covered in a course on cyber law. The course aims to enable students to understand cyber law, explore cyber crimes and related issues, and develop competencies for dealing with cyber fraud. Key topics covered include an overview of cyber law and cyber crimes, intellectual property rights, and the regulation of cyber space in India and globally. The course also seeks to enhance students' understanding of legal issues related to online transactions and clarify intellectual property issues in cyber space.
This document discusses computer and cyber crimes. It defines computer crimes as illegal acts performed by hackers to steal private information from companies or individuals. Cyber crimes are crimes that involve computers and networks, where the computer may be used to enable criminal acts or be the target. Various types of cyber crimes are discussed such as cyber stalking, cyber pornography, intellectual property crimes, and computer vandalism. Computer forensics and tools for investigating cyber crimes are also mentioned.
Cybercrimes are crimes that involve computers and computer networks. This document discusses jurisdiction as a major issue with cybercrimes due to the borderless nature of the internet. It notes that while the Information Technology Act 2000 allows for extra-territorial application of the law, provisions are needed for mutual legal assistance between law enforcement agencies internationally regarding sharing of cybercrime evidence and materials. The document also briefly mentions that cybercrimes in India are classified according to the computer networks involved and type of illegal act committed.
Semelhante a How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (20)
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective
1. How safe is governmental infrastructure: A Cyber
Extortion and Increasing Ransomware Attacks
Perspective
Sulaiman Al Amro
Computer Science Department, Computer College
Qassim University
Qassim, Saudi Arabia
Email: samro@qu.edu.sa
Abstract—Cybercrimes of blackmail — whether emotional or
material — are increasing against users, especially as a result of
the large amount of personal information available due to the
development of social networking sites The development of
modern technology and the dissemination of personal data are
the most important factors in a blackmail incident, which
highlights the lack of monitoring and awareness regarding safe
online behaviours. Blackmail is particularly complex, as young
users tend to be most vulnerable to such crimes. This indicates
that more awareness and dissemination of protection methods
and immunization of society is required, as well as the
strengthening of sanctions. Indeed, research has identified
ignorance regarding modern technology as the main cause of
cybercrimes. Cyber blackmail is an abnormal behaviour that has
a negative impact on an individual, their family, and the
community. It is an indicator of the decline of certain values. It
impacts the psyche of the victim and the stability of their family,
and can lead to family disintegration and the spread of deception
and exploitation, psychological and sexual diseases, and chaos
and fear in society. This study presents an investigation of cyber
blackmail and the malicious software designed to extort money
from victims
Keywords- Cyber Ransomware; Extortion; Malware; Users
I. INTRODUCTION
Cyber extortion is harassment and intimidation conducted
via any electronic platform, such as chat rooms, mobile phones,
blogs, e-mails, and more. One of the most common methods of
cyber extortion is threatening to publish pornographic videos
through pirated accounts in order to manipulate the victim's
emotions. One of the most problematic aspects of digital
blackmail is how difficult it is to monitor. Its prohibition is not
a matter for children or their parents. Despite the rapid spread
of information over the Internet, perpetrators of such crimes
can conceal their identity. Is spreading in the world in general,
and in the Arab world, especially the phenomenon of sexual
extortion on the Internet, or the so-called “sextortion”, which is
based on the exploitation of people aged 19 and over, in order
to blackmail them to get money» [2, 4].
The cyber blackmail process commonly begins with the
victim receiving a friend request on social media from an
account claiming to be a normal user on the site. After the
victim accepts the friend request and chats for a few minutes
via instant messenger, they are asked to continue talking via
sound media. This is when the entrapment takes place: the
victim believes that they are talking to the user who added
them as a friend, but they are in fact talking to a composite
scene from a pornographic film. They then are invited through
the text chat to take off their clothes and do certain activities. In
the meantime, everything is being recorded on their device’s
camera, and once the fabricated conversation ends a link is sent
to the video, which has been uploaded to YouTube. The victim
is told that they must pay a minimum of $1,000 or the link will
be sent to all their friends and family on social media. Many
victims of blackmail do not complain to their parents or elders,
fearing scandal and shame within their community. Instead,
they prefer to accept the extortion and keep the incident a
secret. This is because they believe they are at fault for
revealing their secrets and private information to a stranger on
a social networking site [3].
Cyber extortion is carried out using several software tools,
the most common of which is ransomware, a type of malicious
software that tries to obtain money from users by taking control
of their device or files. Ransomware generally locks the device
to prevent normal usage (locker ransomware) or encrypts files
to prevent access to them (crypto ransomware). The user may
be unaware that they have downloaded ransom software from a
hacked or unsafe website, and this malware can come as an
attachment in anonymous e-mail. Although cybersquatting is
seen as a source of illegal access to funds, and in spite of its
negative impact on users and organizations of all kinds, recent
studies have revealed a steady increase in this type of
cybercrime. Organizations should, in the first instance, seek to
prevent cyber-extortion. In the event of such attacks,
organizations should also take action to prevent their
significant consequences. The best way to do this is to train
specialists and those interested in the subject to understand the
stages of cyber extortion and its operations and consequences,
equip them with the necessary skills to prevent it, and provide
them with the necessary skills to manage cybercrime and
manage it when it occurs.
II. LITERATURE REVIEW
A. Taxonomy
The following sections present important concepts and their
definitions that are vital to understanding the ‘cyber’ sector [7].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
79 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. Cyberspace: A virtual space that seeks to integrate the whole
world, different from real space and where many societies are
distributed unevenly using a technical environment - the
Internet in the first place - where citizens and institutions
benefit from ICT in their interactions.
Cybersecurity: An umbrella term for a wide range of issues,
from information security, to security measures for combating
Internet misuse and cybercrime.
Because Internet architecture has not yet taken
cybersecurity into account, the inclusion of security protection
requires substantial modifications of current Internet
infrastructure and Internet Protocol (TCP), including:
· Incorporation of security into its design
· Infrastructure security
· Mechanisms that protect computers and data
· Secure operating systems
· Safe coding
· Capacity and access control lists
The balance between cybersecurity and human rights, in
particular the right to privacy and freedom of expression, is
constantly changing.
Information and communication technologies (ICT): The
integration of telecommunications and computer hardware as
well as software, storage, and audio-visual systems to allow
users to access, store, transport, and process information.
Information security: The processes and techniques used to
protect information resources from unauthorized acquisition,
exposure, manipulation, alteration, destruction, or loss.
Information security ensures that data is not lost when critical
issues such as natural disasters, computer/server failures,
physical theft, etc., occur and prevents unauthorized access to,
and use, disclosure, obstruction, alteration, examination,
registration, or destruction of data.
Misuse of the Internet: Misuse of the Internet and related
ICTs, which may cause material loss or physical harm to
individuals. There is no line between Internet misuse and
cybercrime. Depending on the degree of material loss or
physical injury to individuals, infringement — violation of law
or rights — or violation of regulations or other codes of
practice through abuse of the Internet with respect to
fundamental human rights may be considered a cybercrime.
Cybercrime: Any crime involving any of the following:
· A computer system (crimes committed by computers or
computer-related crimes in a narrow sense)
· Networking technologies (network crimes in a narrow
sense)
· Or both
Cyberattack: The misuse of the Internet or a cybercrime that
exploits Internet vulnerabilities to launch various types of
attack primarily targeting ICT devices or software, or primarily
to harm people. There are different types of cyberattack (each
with subtypes):
· Active and non-effective attacks
· Attacks on denial of service
· Attempts to replace web pages
· Attacks using malicious software
· Breakthrough
B. Related work
According to research conducted by Google Search,
Internet thieves have seized at least $25,000,000 in the past two
years [1]. Google has created thousands of virtual victims to
detect cybercrime [13]. The research found that two types of
cyber blackmail are the most common, with different patterns.
Firstly, gangs use a type of software to encrypt files so they
cannot be read and then request money from the victim in order
to release their files. Google used more than one way to
identify the money paid, including a representative sample
based on the reports of individuals or entities that have paid a
ransom. The results show that most ransoms are converted into
cash through the company's stock exchange in Russia. As a
result of this research, experts have indicated that they do not
expect to stop the extortion gangs, but instead expect new
gangs and other extortion programs to emerge. For example,
newer gangs pay huge sums of money to people to deliver the
program to a large number of computer devices, so ordinary
people can be pulled into cybercrime.
In their investigation of the online gaming industry, Paulson
et al. (2006) examined DDoS attacks, especially regarding
electronic games, and studied the impact of and possible
solutions to these attacks against websites.
Kassim et al. [11] proposed some countermeasures that
could help mitigate potential risks and threats to social network
users, such as cyber harassment, cyber stalking, and the
creation of fake profiles. Furthermore, Nandhini and Das [12]
suggested an approach that could help to detect similar social
network profiles based on profile attributes and analyse them to
see if they belonged to the same user or multiple people.
III. DISCUSSION
A number of reasons have been identified as causes of
cybercrimes, including those that occur at a global level,
community level, and an individual or personal level. The
identified causes vary according to type of crime, type of
target, and type and level of execution (individual, societal). In
addition, the causes of young and amateur crimes tend to differ
from the causes of professional crimes, and vary according to
targeted theft and information.
The increase in cybercrime victims can be explained by
changes in people's daily activities. With the advent of the
Internet, the way people interact with others, entertainment,
commerce, etc. has changed. The change in people's daily
activities — such as the use of the Internet and online platforms
like Facebook, email, websites and others — has created
opportunities for perpetrators to focus on valuable and easy
Identify applicable sponsor/s here. (sponsors)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
80 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. targets in the space. Thus, crimes tend to occur as a result of
the culmination of three factors: the presence of a motivated
offender, the absence of capable guardians, and the increase of
suitable targets, as shown in Fig.1.
suitable
targets
absence of
capable
guardians
Motivated
offender
FIGURE 1: CYBER EXTORTION OPPORTUNITY
A. The causes of crime at the individual level
Middle Eastern society continues to suffer from the
repression, isolation, weakness, or absence of sexual culture as
a result of fear that it could be used in a manner that is not
religiously or socially correct. This is the crux of the
cybercrime issue in the region. Most of the victims of this type
of fraud lack sufficient experience in using the Internet or
social media. Therefore, the problem is definitely social. Many
users of social media do not care tighten privacy on their own
pages, and try to form a wide circle of friends and followers at
the expense of their security, but the main reason for social
education, and individual awareness. Furthermore, in a study of
universities in Riyadh, 67% of participants believed that weak
punishments was the most prominent cause of cybercrimes
against women, and highlighted the social role of universities
in raising the awareness of students regarding the dangers of
social media and in prompting and improving steps taken by
the government to address the social and psychological effects
of extortion [6].
For the sake of recognition
Some cybercrimes are committed by young people looking
to challenge the status quo and seeking recognition in the
media. This type of perpetrator often stops such behaviour as
they get older. Modern technologies and the Internet have
provided unprecedented opportunities for the spread of such
crimes.
Opportunity
Modern technologies and the Internet have provided
unprecedented opportunities for the spread of cybercrime. The
environment and its structure play a major role in the spread of
crime, and on social norms. Deviation from societal rules and
the absence of censorship increase the chance of cybercrimes
being committed. Information is often an easily attainable goal
which delivers quick benefit, and is thus stolen. It is a
profitable, low-risk opportunity, and the potential for detection
is minimal. ICTs and increased use of the Internet have created
new opportunities for criminals that have facilitated the growth
of crime. That is, cybercrime is a new and distinctive form of
crime, and has created challenges to anticipate and prevent
evolution.
B. Electronic extortion
According to a study conducted by researchers in the
Department of Sociology and Social Work at Imam
Muhammad Bin Saud Islamic University, the weakness of
penalties is one of the main factors leading to crimes of
extortion against women, followed by other factors [6].
Furthermore, 47.3% of the female university students in the
study had personal accounts on social networking sites, 32.3%
reported that they used social networks to communicate daily
for hours. Moreover, 68% of the participants emphasized the
impact of blackmail on issues of display and honour, and 64%
identified the main psychological problems of e-extortion as
constant fear and anxiety
C. Factors leading to blackmail
The study conducted on 300 university students in Riyadh
revealed some facts about extortion, including the university's
knowledge that spreading privacy through communication sites
exposes them to a very high level of blackmail, as well as the
penetration of personal devices, the cause of blackmail of the
victim, as proven knowledge That the communication sites
facilitated the protester threat of the victim [6].
The above indicates that main factors leading to blackmail
are the weakness of sanctions for the perpetrators of extortion,
the weakness of the victim's personality, the perception that
some girls lack emotion, the excessive confidence of girls when
dealing with mobile repair shops, and the weak culture of
women's rights.
D. Psychological problems
The psychological problems of e-extortion include the
suffering of the victim from continuous fear and anxiety, stress
and mental disorders, depressive symptoms, and social
adjustment disorders, which cause chest tightness and breathing
difficulties.
E. Social services
The social role of a university is to raise the awareness of
university students about the dangers of social networks, to
prompt and improve the steps taken by government institutions
to address the social and psychological effects of extortion, and
to train social workers and develop their tools and cultural
composition in accordance with current technical
developments.
She stressed that "the role of social worker in the face of
blackmail, working with the student exposed to extortion, and
suffering from psychological problems and trauma, and
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
81 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. provide the necessary counselling, and try to modify the
behaviour and attitudes of the victim who often suffer from
aggressive tendencies and negative attitudes towards society.
IV. SUGGESTED SOLUTIONS
Constructive and comprehensive awareness and the
circulation of the subject intensively, and try to create projects
and campaigns raise this problem and warn of the seriousness.
Online exploitation stories are too much of an iceberg in a
world where borders are intertwined and partitions are blurred.
Experts have estimated that there are 30,000 crimes of cyber
blackmail annually in the Gulf States alone [5]. Therefore,
awareness, knowledge, and e-culture must be improved to
prevent people from falling victim to such crimes. It is
important that people do not display their personal information
permanently on any site or electronic account, whether for
work or other activities. Furthermore, people should not be
afraid to talk to parents or friends if they are subjected to any
kind of extortion or insult. Indeed, perhaps talking about these
hidden problems and breaking the fear barrier could contribute
to spreading awareness and avoiding a large number of Internet
users becoming victims of cybercrimes on social networking
sites and in their digital life.
Studies have shown that smartphones are targeted three
times more frequently than laptop by spyware, through
transactions or applications, and some applications allow the
owner of the program to spy on the user and determine their
location. In addition, research has shown that users generally
agree to the terms of downloading an application without
reading them. Moreover, the viruses and spyware that are
inserted onto mobile phones have different stages of
intelligence. Some malware can be used maliciously to obtain
the phone owner’s personal details. Others, when opened,
activate a number of commands that allow a hacker to control
and operate the phone camera.
The majority of attacks can be stopped with regular
debugging, so any errors must be fixed quickly. Anti-malware
programs should also be used to help stop infection.
Furthermore, users should avoid opening emails, clicking on
links, or opening attachments from unknown sources.
Moreover, all solid motors and external devices must be
separated after use. In addition, some hackers send messages
on Facebook which say that if the user posts a certain message
or text on the page of any user, they will be sent a secret code.
This method is often used to access girls’ accounts, steal their
pictures, and then demand money, and it is important to raise
awareness of this. Another important solution is to not use
‘cracked’ programs and games, as this is the a common method
used by hackers to install malware or gain access to personal
details. Original copies of the programs must be used and users
should not rely on free programs offered on the Internet,
because some contain malicious programs that run themselves.
Similarly, users should not open any means of communication
or password-protected sites or programs on open networks, or
on devices that are not their own. Finally, all devices should be
closed immediately after use, and users should install anti-virus
software and not open any anonymous emails.
V. CONCLUSION
Many people use social networks to build new friendships
and to communicate with new friends. However, awareness of
the consequences of such relationships — such as the release of
private details or falling victim to social and moral extortionists
— is lacking. Many young people are influenced by the media,
such as television and cinema, and have been exposed to stories
that in many of their details contradict reality and its standards
of socially acceptable behaviour.
Electronic crime and ways to overcome its challenges is a
topic of significant focus for citizens, community institutions,
and legal research. Therefore, it was selected as the focus for
this research paper in order to contribute to understanding of its
dimensions and organization of its rules. This paper
investigated the types of attackers who blackmail and extort
money from Internet users and proposed some methods to
prevent such crimes occurring.
REFERENCES
[1] Hackers have seized $ 25 million in blackmail in two years (2017).
https://steemit.com/technology/@steemmaster/hackers-have-seized-usd-
25-million-in-blackmail-in-two-years. [Accessed 23/12/2019].
[2] Th akkar, D. (2017). Preventing Digital Extortion. Packt Publishing.
[3] Bhardwaj, A., Avasthi, V., Sastry, H., & Subrahmanyam, G. V. B.
(2016). Ransomware digital extortion: a rising new age threat. Indian
Journal of Science and Technology, 9(14).
[4] Schneier, B. (2011). Secrets and lies: digital security in a networked
world. John Wiley & Sons.
[5] Jøsang, A. (2011, June). Trust extortion on the internet, In: International
Workshop on Security and Trust Management. Springer: Berlin,
Heidelberg, Chicago. pp. 6-21.
[6] Najlaa Alharbi (2017) Female university students are subject to
electronic extortion for weak
punishment.http://www.alwatan.com.sa/Nation/News_Detail.aspx?Articl
eID=301593&CategoryID=3
[7] Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials.
Auerbach Publications.
[8] Paulson, R.A. & Weber, J.E. (2006). Cyberextortion: an overview of
distributed denial of service attacks against online gaming companies.
Issues in Information Systems, 7(2), 52-56.
[9] Hampton, N. & Baig, Z.A. (2015). Ransomware: Emergence of the
cyber-extortion menace.
[10] Salvi, M.H.U. & Kerkar, M.R.V. (2016). Ransomware: A cyber
extortion. Asian Journal For Convergence In Technology (AJCT).
[11] Kassim, S.R.M., Zakaria, W.Z.A., Maksom, F., & Abdullah, K. (2018).
Cyber Harassment Trends Analysis: A Malaysia Case Study.
International Journal of Engineering & Technology, 7(4.15), 109-112.
[12] Nandhini, M. & Das, B.B. (2016). Profile Similarity Technique for
Detection of Duplicate Profiles in Online Social Network. International
Journal of Computer Science and Information Technology, 7(2), 507-
512.
[13] Ward, M. (2017). Ransomware 'here to stay', warns Google study.
https://www.bbc.com/news/technology-40737060. [Accessed
02/03/2020].ferences)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 6, June 2020
82 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. IJCSIS
ISSN (online): 1947-5500
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish
original scientific results.
CALL FOR PAPERS
International Journal of Computer Science and Information Security (IJCSIS)
January-December 2020 Issues
The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research,
standards, implementations, running experiments, applications, and industrial case studies. Authors are invited
to submit complete unpublished papers, which are not under review in any other conference or journal in the
following, but not limited to, topic areas.
See authors guide for manuscript preparation and submission guidelines.
Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld
Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons,
ProQuest, EBSCO and more.
Deadline: see web site
Notification: see web site
Revision: see web site
Publication: see web site
For more topics, please see web site https://sites.google.com/site/ijcsis/
For more information, please visit the journal website (https://sites.google.com/site/ijcsis/)
Context-aware systems
Networking technologies
Security in network, systems, and applications
Evolutionary computation
Industrial systems
Evolutionary computation
Autonomic and autonomous systems
Bio-technologies
Knowledge data systems
Mobile and distance education
Intelligent techniques, logics and systems
Knowledge processing
Information technologies
Internet and web technologies, IoT
Digital information processing
Cognitive science and knowledge
Agent-based systems
Mobility and multimedia systems
Systems performance
Networking and telecommunications
Software development and deployment
Knowledge virtualization
Systems and networks on the chip
Knowledge for global defense
Information Systems [IS]
IPv6 Today - Technology and deployment
Modeling
Software Engineering
Optimization
Complexity
Natural Language Processing
Speech Synthesis
Data Mining