Table of Contents
What are the Most Common Types of Cybercrime?
Types of Cybercrime – Cybercrime has created an industry that generates billions of dollars of revenue each year, much of which is fraudulent. It estimates that more than three billion dollars circulate each year and that it harms more than one million users per day, which is equivalent to fourteen victims per second.
The most frequent cybercrimes are related to grievances and slander, harassment, child pornography, intellectual and industrial property rights, and fraud, but mainly with theft and usurpation of the identity of the persons.
The most widely used Techniques for this are mainly three:
Hacking: it is remote access to the computer without the user’s authorization.
Phishing: It consists of impersonating a trusted person or company. Generally, they use email, instant messaging, social networks to deceive recipients into revealing their data, banking, credentials for access to services, and so on.
Malware: is a software or computer platform that, once installed on the computer or mobile device, spies on your actions, thus obtaining data.
According to the “Council of Europe Cybercrime Convention,” approved in 2001, computer crimes or cybercrimes are subdivided into four groups:
1. Crimes against the confidentiality, integrity, and availability of data and computer systems:
- Illegal access to computer systems.
- Illegal interception of computer data.
- Abuse of devices that facilitate the commission of crimes.
2. Cybercrime:
- Computer forgery through the introduction, erasure, or suppression of computer data.
- Computer fraud through the introduction, alteration, or deletion of computer data or interference in computer systems.
3. Content-related offenses:
- Production, offer, dissemination, acquisition of child pornography content, through a computer system or possession of said content in a computer system or data storage medium.
4. Crimes related to infringements of intellectual property and related rights, such as the copying and distributing computer programs or computer piracy.
A brief history of the Internet
The history of the Internet begins during the development stage of the Great American Science of the 50s. Within the framework of the technological battle fought between the government of the United States and the Soviet Union during the Cold War. After the presentation of the Sputnik satellite in 1957 by the Soviet administration, US President Dwight Eisenhower ordered the Department of Defense to create an advanced research agency to carry out studies on war material and communications. After the creation of the ARPA (Advanced Research Projects Agency). However, Larry Roberts from MIT presented to the authorities of the Department of Defense the project to create the ARPANET –the ARPA network-, and began in 1969 the first tests for the connection of military network computers.
In this way, the ARPANET scientists demonstrated that the system was operational. Creating a network of around 40 connected points in different locations. It motivated the search in this field, giving rise to new networks, and in 1982 ARPANET adopted the TCP / IP protocol (Transmission Control Protocol / Internet Protocol, Transmission Control Protocol / Internet Protocol). At that moment, the Internet creates.
One of the first definitions of cybercrime was established in 1983 when the OECD (Organization for Economic Cooperation and Development). Defined it as “any unlawful, unethical or unauthorized behavior related to the automatic processing of data or transmissions of data.”
Description:
In this case, “Trojan” was the first massive virus reported by IBM PC in 1984. As a result, several US states were the first to have a specific law. To protect the computer systems of public institutions.
In this way, computer crimes are those acts committed through ICT. Which affect legal assets protected through the improper use of computer equipment. At first look, we could say that they are heritage, privacy, physical integrity, and / or logic of computer equipment. Web pages when it does not involve the two previous ones and other legal assets protected by the Constitution.