An overview on cybercrime classifications

Perspective - (2022) Volume 10, Issue 4

John Blad*
*Correspondence: John Blad, Department of Political Science, University of Bologn, Bologna, Italy, Email:
Department of Political Science, University of Bologn, Bologna, Italy

Received: 22-Nov-2022, Manuscript No. IJLLS-22-87494; Editor assigned: 24-Nov-2022, Pre QC No. IJLLS-22-87494 (PQ); Reviewed: 09-Dec-2022, QC No. IJLLS-22-87494; Revised: 16-Dec-2022, Manuscript No. IJLLS-22-87494 (R); Published: 23-Dec-2022

About the Study

A crime committed through a computer or computer network is referred to as a cybercrime. Either the computer was the intended target or it was used in the crime. Someone's security or finances may be compromised through cybercrime. When private information is intercepted or made public, whether legally or illegally, there are various privacy issues concerning cybercrime. International cybercrimes, such as financial theft, espionage, and other cross-border crimes, are committed by both state-sponsored and non-state actors. Cyberwarfare is the term sometimes used to describe cybercrimes that take place beyond national boundaries and include at least one nation-state. Cybercrime, according to Warren Buffett, is the "number one concern with mankind" and "poses genuine risks to humanity."

Classifications

Computer fraud, financial crimes, con games, and cybersex trafficking are just a few of the many acts that fall under the umbrella of computer crime (Gámez-Guadix, 2016).

Computer fraud: The use of a computer to steal, modify, or obtain unauthorized access to a computer system or network is known as computer fraud. Internet fraud may be used to describe computer fraud that uses the Internet (Kross, 2021). Depending on the jurisdiction, computer fraud is defined legally in a variety of ways, but often entails unauthorised access to a computer. Hacking into computers to change data, disseminating dangerous software like computer viruses or worms, installing malware or spyware to steal data, phishing, and advance-fee scams are all examples of computer fraud. Computer systems may also be used to aid other types of fraud, such as bank fraud, carding, identity theft, extortion, and theft of sensitive information. These crimes frequently result in the loss of financial or personal information (Kuss, 2017).

Cyberterrorism: Generally speaking, cyberterrorism is an act of terrorism carried out via computer or cyberspace resources. Cyberterrorism can take the form of planned, widespread disruption of computer networks, particularly those of personal computers connected to the Internet, using tools such computer viruses, computer worms, phishing, malicious software, hardware techniques, or programming scripts. Since the beginning of 2001, Internet issues and server frauds have significantly increased, according to government officials and information technology security experts. Government organizations in the United States, including the Federal Bureau of Investigation and the Central Intelligence Agency, are becoming increasingly concerned that such intrusions are a part of a planned effort by cyberterrorist foreign intelligence services or other groups to map potential security gaps in crucial systems (Leinsalu, 2020).

Cyberextortion: Cyberextortion is a sort of extortion that happens when a website, email server, or computer system is attacked by malevolent hackers, such as through denial-of-service attacks, or is threatened with such an attack (Martínez-Ferrer, 2018). Cyberextortionists demand money in exchange for a guarantee that the assaults will stop and that they would provide "protection". The Federal Bureau of Investigation claims that cybercriminals who engage in extortion are increasingly targeting corporate websites and networks, impairing their functionality, and demanding money to resume service. Each month, the FBI receives more than 20 reports of crimes, many of which are not filed because the victim's identity should not be made public. Usually, attackers employ a distributed denial-of-service attack. However, there are additional forms of cyberextortion, including doxing, extortion, and bug poaching (Meerkerk, 2009).

Cybersex trafficking: Cybersex trafficking involves the transportation of victims followed by the webcam live streaming of rape or coercive sexual activity (Meshi, 2020). The victims are taken to "cybersex dens" after being threatened, tricked, or kidnapped. Wherever the cybersex traffickers have access to a computer, tablet, or phone with an internet connection is where the dens may be found (Wheatley, 2019). The perpetrators make advantage of videoconferences, dating websites, chat rooms on the internet, applications, dark web sites, and other platforms. To conceal their identities, they make use of digital currency and online payment methods. Authorities get millions of reports of its occurrence each year. To combat this kind of cybercrime, new laws and police protocols are required.

References

Awards Nomination

Select your language of interest to view the total content in your interested language

Indexed In
  • Index Copernicus
  • Academic Keys
  • CiteFactor
  • Open Academic Journals Index (OAJI)
  • Electronic Journals Library
  • Advanced Science Index
  • Scientific Indexing Services (SIS)
  • Leipzig University Library
  • GEOMAR Library Ocean Research Information Access
  • Bibliothekssystem Universität Hamburg
  • Eurasian Scientific Journal Index
  • Academic Resource Index