getting inside the cybercriminal's m ind
TRANSCRIPT
Arrrr… be a pirate!As a cyber-criminal, you must either copy others’ copyright materials in the course of a business, or you can copy their materials to such an extent that the business you are targeting is aected.
Go forth and spread the virusWrite your own malware, then intentionally distribute a computer virus that will impair the operation of a computer, prevent or hinder access to any program or data, damage the operation of a computer program or the reliability of data on a computer, or enable any of the these things to be done.
Deception is your gameThe next step is to exploit your victim’s online accounts. An alternative is to supply those details you’ve stolen to others online for use in fraudulent activity.
Let’s go phishingTo phish successfully, you need to nd the right bait. Email, SMS and IM will be the primary tools of your
trade, and if your messaging is convincing you might just be able to hook some valuable nancial information
from your poor and gullible victims.
Next up is to corruptAnyone who transmits obscene aicles electronically will be guilty of an oence, regardless of any personal
gain is considered a cyber criminal.
Listen… do you want to know a secret?
If you can get hold of information protected by the law and share it with your friends on social media and on forums, you may well get a visit
from the police.
GETTINGINSIDETHE
CYBERCRIMINAL’S
MINDwww.houseofit.com.au