getting inside the cybercriminal's m ind

1

Click here to load reader

Upload: alin-adrian-florea

Post on 13-Apr-2017

4 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Getting inside the cybercriminal's m ind

Arrrr… be a pirate!As a cyber-criminal, you must either copy others’ copyright materials in the course of a business, or you can copy their materials to such an extent that the business you are targeting is aected.

Go forth and spread the virusWrite your own malware, then intentionally distribute a computer virus that will impair the operation of a computer, prevent or hinder access to any program or data, damage the operation of a computer program or the reliability of data on a computer, or enable any of the these things to be done.

Deception is your gameThe next step is to exploit your victim’s online accounts. An alternative is to supply those details you’ve stolen to others online for use in fraudulent activity.

Let’s go phishingTo phish successfully, you need to nd the right bait. Email, SMS and IM will be the primary tools of your

trade, and if your messaging is convincing you might just be able to hook some valuable nancial information

from your poor and gullible victims.

Next up is to corruptAnyone who transmits obscene aicles electronically will be guilty of an oence, regardless of any personal

gain is considered a cyber criminal.

Listen… do you want to know a secret?

If you can get hold of information protected by the law and share it with your friends on social media and on forums, you may well get a visit

from the police.

GETTINGINSIDETHE

CYBERCRIMINAL’S

MINDwww.houseofit.com.au