A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Cyber

Advance Fee Fraud
Advance Fee Fraud

In 2006, 61% of internet criminals were traced to locations in the United States, while 16% were traced to the United Kingdom, and 6% to Nigeria. Other nations known to have a high incidence of advance-fee fraud include: Ivory Coast, Togo, South Africa, the Netherlands, and Spain.

Attacks on Computer Systems
Attacks on Computer Systems

Cyber attacks might be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it.

source: csoonline.com
Common Types of Cybersecurity Attacks
Common Types of Cybersecurity Attacks

This type of attack can be even more difficult to overcome due to the attacker appearing from many different IP addresses around the world simultaneously, making determining the source of the attack even more difficult for network administrators.

source: rapid7.com
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

source: acunetix.com
image: acunetix.com
Cyber-Bullying
Cyber-Bullying

Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content.

Denial-of-Service Attacks
Denial-of-Service Attacks

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Distributing Child Pornography;
Distributing Child Pornography;

Distributing child pornography is punished more severely than merely possessing pornography. For more general information on child pornography, see Child Enticement Laws and Computer Generated Images and Child Enticement.

image: wavy.com
Email Spam and Phishing
Email Spam and Phishing

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

source: csoonline.com
image: acorn.gov.au
Hacking
Hacking

In computer networking, hacking is any technical effort to manipulate the normal behavior of connected systems and connections including the internet. In computer networking, hacking is any technical effort to manipulate the normal behavior of connected systems and connections including the internet.

source: lifewire.com
Identity Theft
Identity Theft

A stolen identity is a powerful cloak of anonymity for criminals and terrorists and a danger to national security and private citizens alike. For the FBI, identity theft is nothing new—we've been dealing with criminals faking IDs for decades, from check forgers to fugitives on the run.

source: fbi.gov
image: storify.com
Malware Attacks
Malware Attacks

What is a cyber attack? Simply put, a cyber attack is an attack launched from one computer or more computers against another computer, multiple computers or networks.

source: csoonline.com
Man-in-the-Middle (MITM) Attacks
Man-in-the-Middle (MITM) Attacks

If Bob sends his public key to Alice, but Mallory is able to intercept it, a man-in-the-middle attack can begin. Mallory sends a forged message to Alice that purports to come from Bob, but instead includes Mallory's public key.

Misusing Personal Information (Identity Theft);
Misusing Personal Information (Identity Theft);

What Do Thieves Do With Your Information? Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund.

Online Child Sexual Abuse Material
Online Child Sexual Abuse Material

access, possess, distribute, produce, advertise or make available child pornography or child abuse material; procure, groom or engage in sexual activity with a person under 16 years of age, or; send indecent communication to a person under 16 years of age. The Australian Federal Police investigates offences relating to child sexual exploitation online.

source: acorn.gov.au
image: dqindia.com
Online Scams or Fraud
Online Scams or Fraud

Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them. Internet crime schemes steal millions of dollars each year from victims and continue to plague the Internet through various methods.

source: fbi.gov
image: tlc-mag.com
Online Trading Issues
Online Trading Issues

Further information about protecting against online trading scams can be found under Online Shopping. Case study. Tom is a father from Noosa, who tried to purchase a Jack Russell puppy for his children on an online trading website. Tom contacted the seller, GotchaMunee, to express his interest.

source: acorn.gov.au
Other Crimes
Other Crimes

Cyber crimes are any crimes that involve a computer and a network. In some cases, the computer may have been used in order to commit the crime, and in other cases, the computer may have been the target of the crime.

source: study.com
Phishing
Phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

source: csoonline.com
Phishing Attacks
Phishing Attacks

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

source: csoonline.com
Piracy
Piracy

Internet piracy is the unlawful reproduction and/or distribution of any copyrighted digital file that can change hands over the Internet. This can be done with music files, videos and movies, e-books, software, and other materials.

source: wisegeek.org
Prohibited Offensive and Illegal Content
Prohibited Offensive and Illegal Content

Some online content is prohibited under Australian law because it is offensive or illegal. Such material can be found on websites, forums, peer-to-peer networks, and sites providing access to live streamed video.

source: acorn.gov.au
image: acorn.gov.au
Spear Phishing Attacks
Spear Phishing Attacks

Spear phishing can also trick you into downloading malicious codes or malware after you click on a link embedded in the e-mail…an especially useful tool in crimes like economic espionage where sensitive internal communications can be accessed and trade secrets stolen.

Spreading Hate and Inciting Terrorism;
Spreading Hate and Inciting Terrorism;

Forms of cybercrime. Cybercrime takes many forms, and it is therefore difficult to fight. Common forms of cybercrime. ... spreading hate and inciting terrorism;

source: government.nl
SQL Injection Attacks (SQLi)
SQL Injection Attacks (SQLi)

SQL (Structured Query Language) Injection What is SQL Injection SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.

source: incapsula.com
Transaction Fraud
Transaction Fraud

What some might find surprising, though, is the level to which cyber fraud/cyber crime continues to flourish today, roughly 20 years after the beginning of the Internet revolution. In fact, if many experts are correct, it is actually increasing considerably.

source: acfe.com