Cybercrimes Prevention Tips
Total Page:16
File Type:pdf, Size:1020Kb
Cybercrimes NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? growth is critical to crime prevention efforts on protecting A crime committed or facilitated via personal data in public and private the Internet is a cybercrime. sectors. This also helps in the Cybercrime is any criminal activity creation of tools and strategies to involving computers and networks. It combat cyber criminals. can range from fraud to unsolicited emails (spam). It can include the Internet connected activities are as distant theft of government or vulnerable to crime and can lead to corporate secrets through criminal victimization as effectively as trespass into remote systems around common physical crimes. The types the globe. Cybercrime incorporates of crimes that are currently anything from downloading illegal occurring have existed long before music files to stealing millions of the Internet was around. By virtue dollars from online bank accounts. of the tools being used today to Cybercrime also includes non-money commit cybercrimes, criminals are offenses, such as creating viruses on now more anonymous and provided other computers or posting with a virtual market of available confidential business information on victims. The responsibility falls on the Internet. individuals to protect themselves and their families through safe Most cybercrimes cannot be placed online practices. into a single crime category, which makes statistical recording of this “In 2011, the annual cost of activity limited at best. The Internet identity theft alone was $37 Crime Complaint Center (IC3) billion dollars….Identity Theft compiles and releases annual reports made up only 9.8 of all on the statistics and cybercrime cybercrime in 2010.” (Gordon M. facts. Using statistics and facts, Snow, Assistant Director, Cyber analysts prepare reports on Division, Federal Bureau of cybercrime trends and growth. Investigation, Statement before the Knowing the facts, trends, and Senate Judiciary Committee, 1 CYBERCRIMES Subcommittee on Crime and checks for payment and sent the Hacking, which is the illegal Terrorism, Washington, D.C., April excess funds to sender. access of computer or network 12, 2011.) (Source: 2010 Internet Crime Report) resources without authorization Criminal mischief, which includes damaging or destroying Other types of cybercrimes data or information contained on In 2010, the top ten reported include the following: a network with the intent of cybercrimes to the IC3 were Threats or threatening a person depriving the owners and users of 1. Non-delivery payment/ with fear for his or her safety or the information. This can include merchandise—14.4 percent of the safety of others through use installing malicious codes such as the sellers/purchasers did not of a computer network viruses, Trojans, and worms. receive payment/merchandise. Child pornography, which 2. FBI-related scams—13.2 includes the creation, distribution, Cybercrime Prevention or accessing of materials that percent of criminals pose as the Strategies FBI to defraud victims. sexually exploit underage children 3. Identity Theft—9.8 percent Contraband to include Cyber criminals are no different than were unauthorized use of transferring illegal items via the traditional criminals in that they personal identifying information Internet want to make their money as quickly to commit crimes. Copyright or trademark and easily as possible. Cybercrime 4. Computer crimes—9.1 percent infringement prevention can be achieved fairly were crimes that target a Money laundering, which is quickly and in a cost-effective computer or were facilitated by a transferring proceeds from manner. When armed with a little computer. criminal activity with the intent technical advice and common sense, 5. Miscellaneous fraud—8.6 of hiding the source and many cybercrime attacks can be percent of scams and fraud destination of the funds avoided. Similar to target hardening included sweepstakes and work- Cyberbullying, which includes for a residence or a business (e.g., from-home scams. stalking, sending threatening lights, locks, and alarms), the more 6. Advance fee fraud—7.6 percent messages, altering images then difficult it is for a cyber criminal to were the Nigerian letter scam. distributing them with the intent successfully attack a target, the more 7. Spam—6.9 percent of users to harass or intimidate likely he or she is to leave it alone received unsolicited, mass Cyber terrorism, which is and move on to an easier target. produced bulk messages. violence, commonly politically 8. Auction fraud—5.9 percent was motivated, committed against a The following ten tips are basic ways fraudulent or misleading civilian population through the that cybercrime can be prevented. information in the context of an use of or facilitated by computer Keep the computer system up online auction site. technology to date—Cyber criminals will use 9. Credit card fraud—5.3 percent Human trafficking when it is software flaws to attack computer was fraudulent charging of either soliciting or advertising systems frequently and goods and/or services to a Internet facilitated prostitution anonymously. Most Windows- victim’s account. Online gambling, which is based systems can be configured 10. Overpayment fraud—5.3 currently illegal in the United to download software patches and percent of victims deposited bad States updates automatically. By doing 2 CYBERCRIMES this, cyber criminals who exploit might try to gain access to crash monitoring all online activity flaws in software packages may be it, delete information, or steal with the intent to protect the thwarted. This will also deter a passwords and other sensitive system from viruses, other number of automated and simple information. Software firewalls malicious programs, and can be attacks criminals use to break are widely recommended for upgraded to protect against into your system. single computers. The software is spyware and adware. To be safe Secure configuration of the prepackaged on some operating on the Internet, the antivirus system—It is important that systems or can be purchased for software should be configured to computers are configured to the individual computers. For update itself every time the security level that is appropriate multiple networked computers, system connects to the Internet. and comfortable for the user. Too hardware routers typically provide Protect your personal much security can have the firewall protection. (www.fbi.gov/ information—Using many of adverse effect of frustrating the scams-safety/, How to Protect the online services today involves user and possibly preventing Your Computer, www.fbi.gov/ sharing basic personal them from accessing certain web scams-safety/computer_protect) information to include name, content. Using the “help” feature Install or update your antivirus home address, phone number, of the operating system can often software—Antivirus software is and email address. Using address many of the questions in designed to prevent malicious common sense is the best way to this area. software programs from protect against and prevent Choose a strong password and embedding on your computer. If cybercrime. Do not respond to protect it—Usernames, it detects malicious code, like a email messages that contain passwords, and personal virus or a worm, it works to misspellings, poor grammar, odd identification numbers (PIN) are disarm or remove it. Viruses can phrases, or web sites with strange used for almost every online infect computers without the extensions. When in doubt about transaction today. A strong users’ knowledge. Most types of responding to an email, consider a password should be at least eight antivirus software can be set up telephone call to the organization characters in length with a to update automatically (www. to verify authenticity. Type the mixture of letters and numbers. fbi.gov/scams-safety/, How to address for the website in the Using the same password for Protect Your Computer, www.fbi. browser instead of clicking on a various sites or systems increases gov/scams-safety/computer_ link. Any financial transaction the risk of discovery and possible protect.) Nearly 100 percent of website should have an “s” after exploitation. It is never a good the computers sold in the United the letters “http” (e.g., https:// practice to write a password down States today come with some www.mystore.com not http:// and leave it near the system it is form of antivirus software. Failure www.mystore.com). The “s” intended to be used on. to keep this software current is stands for secure and should Changing a password every 90 where a majority of the issues appear when you are in an area days is a good practice to limit arise. The firewall monitors all requesting you to login or provide the amount of time it can be used data flowing in and out of the other sensitive data. Another sign to access sensitive information. computer to the Internet, often that you have a secure connection Keep your firewall turned blocking attacks from reaching is the small lock icon in the on—A firewall helps to protect the system. Antivirus software is bottom of your web browser your computer from hackers who the next line of defense, (usually the right-hand corner.) 3 CYBERCRIMES Read the fine print on website If it seems too good to be true, www.fbi.gov/about-us/investigate/ privacy policies—On many it is—No one is going to receive cyber/cyber social networking and photo a large sum of money from a dead Federal Bureau of Investigation sharing sites, there is wording on Nigerian politician, win a huge (FBI) for tips to avoid Internet the privacy policies that allow the lottery from being “randomly fraud www.fbi.gov/scams-safety/ website to keep information and selected from a database of email fraud/Internet_fraud photos posted to the site, addresses,” or make big money Internet Crime Complaint sometimes indefinitely, even after from “passive residual income a Center www.ic3.gov the original has been deleted by few hours each day working out Department of Justice- Computer the user.