Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-sv6ng Total loading time: 0 Render date: 2024-08-12T18:30:29.791Z Has data issue: false hasContentIssue false

Chapter 14 - Cybersecurity and Cybercrime

Published online by Cambridge University Press:  27 March 2020

Get access

Summary

Background

Cybercrime and computer misuse covers a wide range of activities. These include:

  • • Botnets – a network of private computers infected with malicious software and controlled as a group without the knowledge of the computer's owner.

  • • Copyright abuse – copyright infringement or piracy is the use of works protected by copyright law without the permission of the copyright holder.

  • • Cyber bullying – a form of bullying or harassment which uses electronic means.

  • • Cyber espionage – use of computer networks to obtain illicit access to confidential information. It is the act of obtaining secrets and information without the knowledge or permission of the holder from individuals, competitors, governments and enemies.

  • • Cyber terrorism – the politically motivated use of computers and the internet to conduct violent acts which result in or threaten the loss of life or significant bodily harm.

  • • Denial of service attack (see Section 14.11) – hackers attempt to prevent legitimate users from accessing the service. It usually involves sending a large amount of messages asking the network or server to authenticate requests that have invalid return addresses thereby keeping the network or server busy.

  • • Hacking (see Section 14.6) – gaining unauthorised access into a system or computer. Hackers could potentially steal or destroy data or prevent authorised users from accessing the system.

  • • Malware – malicious software designed to damage, disrupt or gain access to a computer system to cause harm. Malware can perform functions such as stealing, encrypting or deleting sensitive data, or monitoring a computer user's activity without their knowledge or permission.

  • • Pharming (see Section 14.10.2) – the act of directing internet users to a bogus website which mimics the appearance of a legitimate one in order to obtain personal information.

  • • Phishing (14.10.1) – the fraudulent practice of sending emails to people which claim to be from a reputable company in order to induce them to reveal personal information

  • • Ratting – hacking into a computer to take control of its functions. Derived from RAT or remote access tool.

  • • Revenge porn – posting on the internet sexually explicit images or videos without the consent of the subject, in order to cause them distress or embarrassment. Typically carried out by a former sexual partner.

Type
Chapter
Information
Publisher: Facet
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×