1 00:00:00,080 --> 00:00:03,350 Cybercrime can be originated from two main sources. 2 00:00:03,380 --> 00:00:06,530 Insider attacks and external attacks. 3 00:00:06,740 --> 00:00:08,440 Insider attacks. 4 00:00:08,450 --> 00:00:14,720 This is the most dangerous cyber risk facing organizations today, as it can last for a long time without 5 00:00:14,720 --> 00:00:16,760 them knowing about it. 6 00:00:16,790 --> 00:00:22,970 Such attacks come when there is a breach of trust from employees or other people like former employees, 7 00:00:22,970 --> 00:00:29,060 third party contractors or business associates working within the Target organization who have legitimate 8 00:00:29,060 --> 00:00:35,930 access to its computing systems and or information about its cybersecurity practices and defenses. 9 00:00:36,470 --> 00:00:39,500 Economic espionage falls under this category. 10 00:00:40,280 --> 00:00:41,710 External attacks. 11 00:00:41,720 --> 00:00:48,050 This kind of attack originates from outside the Target organization, usually coming from skilled hackers. 12 00:00:48,080 --> 00:00:52,980 Such attacks constitute the largest attacks against organizations around the world. 13 00:00:53,000 --> 00:00:58,910 A black hat hacker can try to penetrate the target organization's computing networks from another country 14 00:00:58,910 --> 00:01:01,370 to gain unauthorized access. 15 00:01:01,400 --> 00:01:08,090 Sometimes external attackers gain intelligence from an insider disgruntled employee in the target company 16 00:01:08,090 --> 00:01:12,840 who has information about its security systems to facilitate their illegal access. 17 00:01:12,860 --> 00:01:15,470 How are computers used in cybercrimes? 18 00:01:15,950 --> 00:01:21,890 Cybercrime can be divided into three main categories with regard to how the computing device was used 19 00:01:21,890 --> 00:01:23,060 to commit a crime. 20 00:01:23,690 --> 00:01:24,620 One. 21 00:01:24,770 --> 00:01:28,250 A computing device is used as a weapon to commit a crime. 22 00:01:28,640 --> 00:01:38,060 Example launching denial of service DDoS attacks or sending ransomware to a computing device is the 23 00:01:38,060 --> 00:01:39,510 target of a crime. 24 00:01:39,560 --> 00:01:44,330 Example gaining unauthorized access to a target computer. 25 00:01:44,600 --> 00:01:45,560 Three. 26 00:01:46,010 --> 00:01:49,650 A computing device is used as a facilitator of a crime. 27 00:01:49,670 --> 00:01:57,050 Example using a computer to store incriminating data or to make online communications with other criminals.