1 00:00:00,080 --> 00:00:01,700 Example of cybercrime. 2 00:00:01,850 --> 00:00:07,160 Different types of computer threats are associated with various types of damaging effects. 3 00:00:07,430 --> 00:00:13,880 For example, some threats may damage or corrupt your installed operating system and force you to reinstall 4 00:00:13,880 --> 00:00:14,360 it. 5 00:00:14,570 --> 00:00:18,380 Another type may steal your credentials and saved passwords. 6 00:00:18,860 --> 00:00:22,460 Still, other threats may not bring any harm to your PC. 7 00:00:22,730 --> 00:00:27,230 Instead, they will track your online activities and invade your privacy. 8 00:00:27,470 --> 00:00:33,200 Today, criminals are smarter than ever before, and malicious programs are more sophisticated. 9 00:00:33,230 --> 00:00:39,320 Modern malware can infect a target computing device and remain undetected for a long time. 10 00:00:39,680 --> 00:00:45,350 The motive behind the majority of cyber attacks nowadays is not to damage your machine, but instead 11 00:00:45,350 --> 00:00:50,660 to steal your money, to access your private information or to acquire your logon credentials. 12 00:00:50,900 --> 00:00:57,380 Similar to traditional crime, cybercrime can be grouped into various categories according to the malicious 13 00:00:57,380 --> 00:00:59,360 actor's objected for applying it. 14 00:00:59,450 --> 00:01:04,210 The following are the most common forms of cybercrime malware distribution. 15 00:01:04,290 --> 00:01:10,800 Malware is short for malicious software and is any software employed to bring damage to computing devices, 16 00:01:10,800 --> 00:01:16,800 computers, smartphones, etcetera, or the stored content data or applications? 17 00:01:16,830 --> 00:01:22,560 Malware corruption can manifest in different ways, such as formatting your hard disk, deleting or 18 00:01:22,560 --> 00:01:28,770 corrupting files, stealing, saved login information, gathering sensitive information, your files 19 00:01:28,770 --> 00:01:33,900 and private photos, or simply displaying unwanted advertisements on your screen. 20 00:01:34,020 --> 00:01:40,140 Many malware variants are stealthy and operate silently without the user's knowledge or awareness. 21 00:01:40,170 --> 00:01:46,560 Malware is a term used to refer to many types of malicious software, such as computer viruses, worms, 22 00:01:46,590 --> 00:01:50,370 Trojan horses, spyware, Ransomware, rootkit. 23 00:01:50,370 --> 00:01:51,900 Scareware and adware. 24 00:01:51,930 --> 00:01:53,610 Ransomware Distribution. 25 00:01:53,850 --> 00:01:58,740 Ransomware is computer malware that installs silently on the user's machine. 26 00:01:58,770 --> 00:02:06,210 Its objective is to deny access to user files, sometimes encrypting the entire hard drive HD and even 27 00:02:06,210 --> 00:02:10,500 all the attached external drives and connected cloud storage accounts. 28 00:02:10,650 --> 00:02:16,920 It then demands that the user pay a ransom to get the malware creator to remove the restriction so the 29 00:02:16,920 --> 00:02:20,730 user can regain access to the system and stored assets. 30 00:02:21,330 --> 00:02:22,710 Cryptojacking. 31 00:02:23,040 --> 00:02:29,400 This is a piece of code usually written in JavaScript that infects your computer silently via a web 32 00:02:29,400 --> 00:02:31,740 browser to mine cryptocurrencies. 33 00:02:31,860 --> 00:02:37,920 As the cryptocurrency wave is on the rise, more cybercriminals are using such techniques for commercial 34 00:02:37,920 --> 00:02:41,490 gain using other people's computers without their knowledge. 35 00:02:41,520 --> 00:02:45,060 This attack consumes much of the target computer's CPU. 36 00:02:45,090 --> 00:02:51,750 Hacking Hacking is the process of invading your privacy by gaining unauthorized access to your computing 37 00:02:51,750 --> 00:02:53,730 device or internal network. 38 00:02:53,940 --> 00:03:00,420 Hackers usually scan your machines for vulnerabilities such as unpatched windows updates and gain access 39 00:03:00,420 --> 00:03:01,320 through them. 40 00:03:01,530 --> 00:03:08,370 After gaining access, they may install a keylogger or a Trojan horse to maintain their access to begin 41 00:03:08,370 --> 00:03:11,940 stealing information or to spy on user activities. 42 00:03:12,680 --> 00:03:14,240 SQL injections. 43 00:03:14,630 --> 00:03:20,030 This is a hacking technique that allows hackers to attack the security vulnerabilities of the database 44 00:03:20,030 --> 00:03:21,620 that runs a website. 45 00:03:21,650 --> 00:03:29,150 An attacker enters SQL code into target website web forms and executes it to force the back end database 46 00:03:29,150 --> 00:03:33,100 of the website to release confidential information to the attacker. 47 00:03:33,170 --> 00:03:34,520 You speed farming. 48 00:03:34,790 --> 00:03:41,630 This is a cyber attack intended to redirect users from a legitimate website to a fraudulent site without 49 00:03:41,630 --> 00:03:42,530 their knowledge. 50 00:03:42,560 --> 00:03:46,910 The end goal is usually to infect the target computer with a malware. 51 00:03:46,940 --> 00:03:55,010 Phishing phishing messages come in different shapes, such as SMS messages, emails and web site links, 52 00:03:55,010 --> 00:04:01,580 URLs, all of which are designed to look genuine and use the same format as the legitimate company they 53 00:04:01,580 --> 00:04:02,630 pretend to be. 54 00:04:02,780 --> 00:04:08,840 Phishing aims to collect user sensitive details such as banking information, login credentials and 55 00:04:08,840 --> 00:04:14,130 credit card info by tricking the end user into handing the information to the attacker. 56 00:04:14,160 --> 00:04:16,110 Email bombing and spamming. 57 00:04:16,530 --> 00:04:23,280 Email bombing occurs when an intruder or a group of intruders sends a large volume of emails to a target 58 00:04:23,280 --> 00:04:26,550 server or target email account making it crash. 59 00:04:26,580 --> 00:04:33,930 Spam is unsolicited email that usually sent to a large number of users for commercial purposes showing 60 00:04:33,960 --> 00:04:35,390 ads or promotions. 61 00:04:35,400 --> 00:04:41,760 However, many spam emails contain disguised links that can lead the victim to phishing websites or 62 00:04:41,760 --> 00:04:46,410 to malicious websites hosting malware to further infect the user's machine. 63 00:04:47,130 --> 00:04:48,420 Identity theft. 64 00:04:48,930 --> 00:04:55,110 Identity theft is stealing personal information about people and using it in an illegal context. 65 00:04:55,650 --> 00:04:57,060 Cyberstalking. 66 00:04:57,180 --> 00:04:59,850 This is an invasion of the user's privacy. 67 00:04:59,880 --> 00:05:05,940 It works when an intruder follows a target person's online activity and tries to harass slash threaten 68 00:05:05,940 --> 00:05:12,450 him or her using verbal intimidation via email, chat services and social media. 69 00:05:12,600 --> 00:05:18,690 The wide reach of social media sites and the vast amount of personal details available publicly make 70 00:05:18,690 --> 00:05:22,360 cyberstalking a major problem in today's digital age. 71 00:05:22,380 --> 00:05:24,480 Using Internet network Illegally. 72 00:05:24,510 --> 00:05:28,650 Spreading illegal contents and selling illegal services and products. 73 00:05:28,680 --> 00:05:35,220 Example include spreading hate and inciting terrorism and selling drugs and weapons, especially in 74 00:05:35,220 --> 00:05:36,360 the darknet market. 75 00:05:37,190 --> 00:05:38,630 DDoS attacks. 76 00:05:39,140 --> 00:05:45,590 A DDoS attack is an attempt to make an online service unavailable by overwhelming it with traffic from 77 00:05:45,590 --> 00:05:46,940 multiple sources. 78 00:05:47,240 --> 00:05:53,450 Attackers build networks of infected computers, which could be millions of machines known as botnets 79 00:05:53,450 --> 00:05:58,370 by spreading malicious software through emails, websites and social media. 80 00:05:58,550 --> 00:06:04,580 Once infected, these machines can be controlled remotely by a bot master without their owner's knowledge 81 00:06:04,580 --> 00:06:08,030 and used like an army to launch an attack against any target. 82 00:06:08,060 --> 00:06:09,560 Social Engineering. 83 00:06:09,800 --> 00:06:16,340 Social engineering is a kind of attack that uses psychological tricks, social tricks over the phone, 84 00:06:16,340 --> 00:06:22,850 or uses a computing device to convince someone to hand over sensitive information about himself or herself 85 00:06:22,850 --> 00:06:26,000 or about an organization and its computer systems. 86 00:06:26,180 --> 00:06:27,890 Software piracy. 87 00:06:28,190 --> 00:06:35,180 This is the unauthorized use, downloading and distribution of pirated material like movies, games, 88 00:06:35,180 --> 00:06:39,810 software, songs, books and other intellectual property products. 89 00:06:40,140 --> 00:06:45,540 Cybercrimes could be conducted by either one person or a group of organized criminals. 90 00:06:45,570 --> 00:06:51,870 The latter is more dangerous as it has the resources to conduct and develop sophisticated attacks against 91 00:06:51,870 --> 00:06:54,270 target organizations and individuals.