Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet21/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   17   18   19   20   21   22   23   24   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

 
3.6 Cyberextortion
:
Attackers will harass victims in 
order to avoid cyber damage. Cybercriminals will 
demand money for financial gain to avoid 
computer-related threats. A typical attack takes 
place using ransomware and asking the victim for a 
Bitcoin payment. 
 
3.7 Cyberfraud
:
Online fraud or forgery does exist 
in many possible ways. Victims are tricked using 
digital technologies. Some examples combine 
online auctions, stock fraud, credit card fraud, 
telemarketing fraud, false advertising schemes, 
false damage claims, insider trading, cyber smear 
campaigns, ad hoc fraud, computer hoaxes, click 
fraud, Ponzi/pyramid schemes, lottery/sweepstakes 
and 
contest 
scams, 
get-rich-quick 
schemes, 
Nigerian scam, ringtone scam, missed call scam, 
text message scam, SMS trivia scam, health scam, 
emergency scam, dating scam, job scam, small 
business scam and service scam. 
3.8 Cybergrooming
:
This online conduct allows a 
pedophile to build a relationship with the victim in 
order to gradually engage in sexual molestation. 
Once the offender gains the victim‘s trust, he will 
escalate using texting and phone calls containing 
sexually explicit material. 
 
3.9 Cyberheist
:
This cybercrime involves a large 
scale theft from banks or financial institutions. 
Malware, hacking or phishing techniques are 
normally part of the crime. The theft takes place 
using e-banking transactions, e-payments, inflating 
bank accounts and stealing cash from ATMs. 
3.10 Cybering
:
This involves a series of online sex 
behaviors to stimulate children in a sexual way. The 
offenders exchange texting, images and video clips 
with their victims. Cyber child molesters access 
online communities, chat rooms, games and virtual 
worlds.

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   17   18   19   20   21   22   23   24   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish