ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cyber Crimes

Updated on January 2, 2018

HACKING: Making a system (any system) perform in a way which it wasn’t intended to operate..

CYBER CRIMES: Internet Fraud and Financial Crimes

A variety of internet scams, many based on phishing and social engineering efforts, targeting consumers and businesses.

These can be defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to: Chat rooms, emails, notice boards and groups and mobile devices: cell phones, laptops, tablets, Bluetooth” (source: wikipedia). Cyber crimes may threaten a person or a nation’s defenses and financial security. Identity and Data Theft, Spoofing of IP and MAC addresses, Computer Certificate falsification and Data Alteration are only some of the common methods used to achieve these crimes, also making it feasible to falsely fabricate a victim’s involvement with a transaction or event. The vast majority of internet scams are based on social engineering efforts, which can be computer or human based.

SOCIAL ENGINEERING ATTACKS >>

A violent social engineering effort is called a “rubber hose” attack. As hilarious as the name sounds, it is responsible for an estimated 91% of data breaches worldwide (ref: https://www.darkreading.com/endpoint/91–of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704? and https://blog.securityinnovation.com/blog/2015/11/protect-organization-against-91-percent-data-breaches.html). Most peculiar to me, although this “trick” has been around since before the birth of the internet, only a small handful of people seem to know how to identify it. I call it a gimmick, because that’s it’s logical classification. It is based on taking advantage of certain personality traits and deceiving someone into giving up information or tricking a person into doing something they’re not supposed to do. Who hasn’t let a person through a lobby door first, because they’re carrying bags or look older? Who wouldn’t give their credentials to the “trusted” security guard? If you don’t hold that door open or deny giving that guard your accreditation, you may be considered “rude” or “antisocial”. However, the people that react this way to these every day circumstances, are those who just know better. It is human nature to be kind and considerate, to give information when we feel there is an urgency to provide it…and the desire to be helpful and liked by others, is also absolutely human. And all of these traits, are exactly what attackers pray upon. Computer based social engineering is accomplished mostly through phishing and human based social engineering is done through the phone or in person, as the name suggests. One of the best movies depicting a social engineer at work is “Catch Me If You Can”. If you haven’t seen it, do. It’s long, but you won’t be disappointed.

PHISHING ATTACKS >>

Phishing is the pursuit of accessing privileged information such as usernames, passwords, social security numbers, bank account details and more, often for nefarious reasons, under the pretext of a trustworthy entity, usually in electronic forms of communication. However phishing can also be “human based”. Information can be extracted through the phone or even in person, through a seemingly innocent line of questions and answers. It is widely used to establish social engineering intrusions.

Computer fraud is any counterfeit data display, executed with the intent of letting another do, or refrain from doing, something which can cause loss of funds or data. Fraud can result in securing an advantage for profit by:

a) Tampering with data in an illegitimate way. This common form of theft, is executed by employees or insider affiliates of a prospective company, and requires no technical expertise. This is accomplished by modifying data before entry in the system, or by entering unauthorized instructions or using unapproved processes; these employees may be disgruntled or simply under the influence of greed.

b) The alteration or deletion of stored data, which is extremely difficult to identify. Editing, sabotaging, concealing, or information embezzlement, most often to cover up illegitimate transactions, are only some of the ways used to carry out cyber crimes, without detection. This requires technical knowledge to achieve.

Have data breaches come to an end? Are we finally safe from “crackers”? Will the end of “net neutrality” bring a new era for web users, privacy and security? What difference will it make if our fundamental right to access information, becomes censored and tailored to whatever “ethical” stance each ISP stands behind? Or have we just hit the tip of CyberWars iceberg? Many believe, (and I share this opinion), that this is only the beginning, given the evidence at hand.

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: "https://hubpages.com/privacy-policy#gdpr"

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)