Cyber Securityand International Security
Cyber Securityand International Security
Cyber Securityand International Security
Instructions: This is a single case study question. Please answer all the
questions attached to it. The total sum mark is 100%
CYBER CRIMINALITY
So, what exactly counts as cybercrime? And are there any well-known
examples?
Malware attacks
Phishing
Unlike mass phishing campaigns, which are very general in style, spear-
phishing messages are typically crafted to look like messages from a trusted
source. For example, they are made to look like they have come from the CEO
or the IT manager. They may not contain any visual clues that they are fake.
Cybercriminals who are carrying out cyberextortion may use the threat of a
DDoS attack to demand money. Alternatively, a DDoS may be used as a
distraction tactic while other type of cybercrime takes place.
A famous example of a phishing scam from 2018 was one which took place
over the World Cup. The World Cup phishing scam involved emails that were
sent to football fans. These spam emails tried to entice fans with fake free trips
to Moscow, where the World Cup was being hosted. People who opened and
clicked on the links contained in these emails had their personal data stolen.
Anti-virus software allows you to scan, detect and remove threats before they
become a problem. Having this protection in place helps to protect your
computer and your data from cybercrime, giving you piece of mind.
If you use anti-virus software, make sure you keep it updated to get the best
level of protection.
Be sure to use strong passwords that people will not guess and do not record
them anywhere. Or use a reputable password manager to generate strong
passwords randomly to make this easier.
A classic way that computers get infected by malware attacks and other forms
of cybercrime is via email attachments in spam emails. Never open an
attachment from a sender you do not know.
Never give out personal data over the phone or via email unless you are
completely sure the line or email is secure. Make certain that you are speaking
to the person you think you are.
If you get asked for data from a company who has called you, hang up. Call
them back using the number on their official website to ensure you are
speaking to them and not a cybercriminal. Ideally, use a different phone
because cybercriminals can hold the line open. When you think you’ve re-
dialed, they can pretend to be from the bank or other organization that you
think you’re speaking to.
Total: 100marks