Copyright

Remediation of Cybercrime: Issues & Fixes

Instructor: Gary Manns

Gary has taught graduate and undergraduate courses in IT and has a master's degree in Information Assurance and Security.

In this lesson you will learn about common attacks used by cyber criminals that aim to perform malicious activity. The lesson will also teach you how to protect individuals from becoming victims of cybercrime.

Cybercrime Introduced

Cybercrime is criminal activity in which an Internet-connected electronic device is used as the means to carry out a crime. In the digital world that we live in today, cybercrime continues to rise from year to year as our society becomes more dependent on the Internet. According to a report published by McAfee in 2018, cybercrime cost the world's economy approximately $600 billion USD. A survey performed as part of the report stated that 64% of survey participants were victims of some variation of cybercrime.

Now that we have defined cybercrime let's talk about types of cybercrime, the issues it creates and how we can stop it.

Types of Cybercrime

There are many types of cybercrime and just as many if not more issues that can be created by it. Here are some of the most common.

Phishing

Phishing is one of the most common types of cybercrime. Phishing uses fake email messages for the purpose of obtaining personal or sensitive information from potential victims.

Identity Theft

Identity theft is the tactic where a cyber criminal impersonates an individual by misusing the individual's information for malicious purposes.

Hacking

Hacking attempts to gain unauthorized access to an Internet-connected electronic device or website. A cybercriminal can hack the device or website for the purpose of making it unavailable for use, for stealing information, or for defacing it.

Invasion of Privacy

Invasion of privacy occurs when an Internet-connected device is used for the purpose of intruding on someone's personal life. This can be accomplished by hacking a device, reading a person's email or monitoring a person's social media account.

Cyberstalking

Cyberstalking happens when a criminal goes to great lengths to monitor the Internet presence of their victim. Similar to invasion of privacy, hacking can be used to install malicious software on the intended victim's devices for the purpose of collecting the information the criminal is trying to obtain.

Fixes and Protection

Now that we have identified the common types of cybercrime, let's explore how to defend ourselves from them. Protecting ourselves from cybercrime is not just about running anti-virus software on a computer or a mobile device. It is equally (if not more) important to educate yourself on how to spot the signs of cyber criminals.

The first cybercrime discussed above was phishing. While email system providers do their best to protect consumers from phishing attacks, they do not catch every phishing attempt. In these instances, it is important for a person to be able to identify a phishing email. Below are a few tactics on how to spot an attempt:

  • The email comes from a person who you do not know.
  • The email contains poor grammar.
  • The email sounds too good to be true.

Figure 1 below shows an example of a phishing email.

Figure 1: Sample Phishing Email
Phishing Email Example

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support