Ch 2: Basics of Cybercrime

About This Chapter

Use this fun and engaging chapter to boost your knowledge of cybercrime basics. Whether you're learning for personal insight or hope to excel on an upcoming test or assignment, our entertaining lessons and short quizzes make studying cybercrime simple and effective.

Basics of Cybercrime - Chapter Summary

If you're looking to gain full comprehension of the basics of cybercrime, this chapter can help. By learning from our expert instructors, you can build your knowledge of technocrime, pharming attacks, phishing, social engineering and much more. Enjoy this chapter's self-paced format, which gives you the flexibility to choose which lessons to review and visit as often as you'd like. Accompanying each lesson is a multiple-choice quiz designed to test your knowledge of key concepts. Our chapter exam ensures you have a quality understanding of all lessons. When you're finished, you will be able to:

  • List and describe different types of Internet security threats
  • Share examples of technocrime
  • Define and detail the history and laws of cybercrime
  • Outline types of cyber threats and discuss cyber threats to U.S. national security
  • Exhibit knowledge of computer security and threat prevention for organizations and individuals
  • Provide examples of pharming attacks and phishing
  • Discuss ways businesses assess the risk of and respond to cybercrime
  • Identify and discuss types of social engineering
  • Detail threats and risks associated with social media

11 Lessons in Chapter 2: Basics of Cybercrime
Test your knowledge with a 30-question chapter practice test
Types of Internet Security Threats

1. Types of Internet Security Threats

In this lesson, we will define internet security, identify the information being threatened, and discuss the fourteen common internet security threats invading our networks.

Technocrime: Forms & Examples

2. Technocrime: Forms & Examples

As a result of us living in a world ruled by technology, a new type of crime known as technocrime has evolved. This lesson will examine the different types of technocrimes ranging from computer crimes to crimes committed with handheld devices.

What is Cybercrime? - Definition, History, Types & Laws

3. What is Cybercrime? - Definition, History, Types & Laws

In this lesson, you'll learn what constitutes cybercrime and examine its historical origins. You'll also look at the different types of cybercrime and the laws governing this type of crime.

Cyber Threats: Definition & Types

4. Cyber Threats: Definition & Types

Explore types of cyber threats and how they affect us. We cannot guarantee that our private data is secure on the Internet. Too many threats exist out there! Let's see what we face on a daily basis when we log on.

Cyber Threats to US National Security

5. Cyber Threats to US National Security

While images of terrorism may keep us up at night, the real threat to American national security comes from cyber attacks. This lesson details the commonalities of those threats.

Computer Security & Threat Prevention for Individuals & Organizations

6. Computer Security & Threat Prevention for Individuals & Organizations

Computer security and threat prevention is essential for individuals and organizations. Effective security measures can reduce errors, fraud, and losses. This lesson will explore unintentional threats and intentional threats. Various security measures and defenses will be explored, including encryption, firewalls, anti-virus, anti-spyware, passwords, back-ups, and biometric security.

What is a Pharming Attack? - Definition & Examples

7. What is a Pharming Attack? - Definition & Examples

In this lesson, you'll learn about pharming attacks and the various activities that hackers engage in to make the attack successful, as well as examples of vulnerabilities in computer systems that hackers exploit.

Cyber Crime in Business: Assessing Risk & Responding

8. Cyber Crime in Business: Assessing Risk & Responding

In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.

What is Phishing? - Definition, Examples & Awareness

9. What is Phishing? - Definition, Examples & Awareness

Phishing is the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. This lesson discusses different types of phishing schemes, as well as the social, legal, and technological responses to these growing threats.

What is Social Engineering? - Definition, Types & Threats

10. What is Social Engineering? - Definition, Types & Threats

Social engineering attacks are methods that scammers use to deceive users to divulge personal and financial information. There are many different scams used to trick people both online and offline. We will examine a few of these techniques.

Social Media: Threats, Risks & Security

11. Social Media: Threats, Risks & Security

In this lesson, we'll take a look at social media, what it is, some threats or risks associated with it, and how to protect yourself when on using social media.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support