About This Chapter
Basics of Cybercrime - Chapter Summary
If you're looking to gain full comprehension of the basics of cybercrime, this chapter can help. By learning from our expert instructors, you can build your knowledge of technocrime, pharming attacks, phishing, social engineering and much more. Enjoy this chapter's self-paced format, which gives you the flexibility to choose which lessons to review and visit as often as you'd like. Accompanying each lesson is a multiple-choice quiz designed to test your knowledge of key concepts. Our chapter exam ensures you have a quality understanding of all lessons. When you're finished, you will be able to:
- List and describe different types of Internet security threats
- Share examples of technocrime
- Define and detail the history and laws of cybercrime
- Outline types of cyber threats and discuss cyber threats to U.S. national security
- Exhibit knowledge of computer security and threat prevention for organizations and individuals
- Provide examples of pharming attacks and phishing
- Discuss ways businesses assess the risk of and respond to cybercrime
- Identify and discuss types of social engineering
- Detail threats and risks associated with social media
1. Types of Internet Security Threats
In this lesson, we will define internet security, identify the information being threatened, and discuss the fourteen common internet security threats invading our networks.
2. Technocrime: Forms & Examples
As a result of us living in a world ruled by technology, a new type of crime known as technocrime has evolved. This lesson will examine the different types of technocrimes ranging from computer crimes to crimes committed with handheld devices.
3. What is Cybercrime? - Definition, History, Types & Laws
In this lesson, you'll learn what constitutes cybercrime and examine its historical origins. You'll also look at the different types of cybercrime and the laws governing this type of crime.
4. Cyber Threats: Definition & Types
Explore types of cyber threats and how they affect us. We cannot guarantee that our private data is secure on the Internet. Too many threats exist out there! Let's see what we face on a daily basis when we log on.
5. Cyber Threats to US National Security
While images of terrorism may keep us up at night, the real threat to American national security comes from cyber attacks. This lesson details the commonalities of those threats.
6. Computer Security & Threat Prevention for Individuals & Organizations
Computer security and threat prevention is essential for individuals and organizations. Effective security measures can reduce errors, fraud, and losses. This lesson will explore unintentional threats and intentional threats. Various security measures and defenses will be explored, including encryption, firewalls, anti-virus, anti-spyware, passwords, back-ups, and biometric security.
7. What is a Pharming Attack? - Definition & Examples
In this lesson, you'll learn about pharming attacks and the various activities that hackers engage in to make the attack successful, as well as examples of vulnerabilities in computer systems that hackers exploit.
8. Cyber Crime in Business: Assessing Risk & Responding
In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.
9. What is Phishing? - Definition, Examples & Awareness
Phishing is the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. This lesson discusses different types of phishing schemes, as well as the social, legal, and technological responses to these growing threats.
10. What is Social Engineering? - Definition, Types & Threats
Social engineering attacks are methods that scammers use to deceive users to divulge personal and financial information. There are many different scams used to trick people both online and offline. We will examine a few of these techniques.
11. Social Media: Threats, Risks & Security
In this lesson, we'll take a look at social media, what it is, some threats or risks associated with it, and how to protect yourself when on using social media.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 110: Introduction to Cybersecurity course
- Introduction to Cybersecurity
- The Role of People in Cybercrime
- Policies & Procedures for Cybersecurity
- Tools & Techniques for Cybersecurity
- Impact of Cybercrime on Electronic Communication
- Cryptography in Cybersecurity
- Understanding & Preventing Computer Viruses
- Cybercrime & Software Development
- Operating System & Network Security
- Disaster Recovery in Cybersecurity