Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added one more Example of cybercrime in cybercrimes.html #15

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions cybercimes.html
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,10 @@ <h4><strong>Distributed DoS attacks</strong></h4>
<p>
Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks.A DDoS attack overwhelms a system by using one of the standard communication protocols it uses to spam the system with connection requests. Cybercriminals who are carrying out cyberextortion may use the threat of a DDoS attack to demand money. Alternatively, a DDoS may be used as a distraction tactic while another type of cybercrime takes place. A famous example of this type of attack is the 2017 DDoS attack on the UK National Lottery website. This brought the lottery’s website and mobile app offline, preventing UK citizens from playing. The reason behind the attack remains unknown, however, it is suspected that the attack was an attempt to blackmail the National Lottery.
</p>
<h4><strong>Spoofing</strong></h4>
<p>
Spoofing occurs when a cyber criminal disguises themself as an individual, business, or entity to commit malicious acts. Cyber criminals use various methods to spoof their identity, varying from spoofed email addresses, websites, or phone numbers to more advanced strategies like fraudulent IP addresses, Domain Name Servers (DNS), or Address Resolution Protocol (ARP). Regardless of the tactics used, the goal of a spoofing scam is to steal from victims and damage their reputations. Cyber criminals leverage common social engineering maneuvers and employ fake email addresses, websites, or contact numbers to trick victims into divulging confidential information, downloading attachments, or clicking links that install malware. Scammers ease the average victim's suspicion by relying on entities most people are familiar with, such as known brands, financial institutions, government offices, and so on. As a result, their guard is let down, making it possible to take advantage of the human nature of trust.
</p>
</article>
</section>

Expand Down