CASES.LU

Glossary

  1. ▹ Antivirus
  2. ▹ Assets
  3. ▹ Authentication
  4. ▹ Availability
  5. ▹ Basic criteria for risk analysis
  6. ▹ Computer Hacks
  7. ▹ Confidentiality
  8. ▹ Control
  9. ▹ Cryptography
  10. ▹ Cybercrime
  11. ▹ Cybercriminals
  12. ▹ DRP – Disaster Recovery Plan
  13. ▹ Data backups
  14. ▹ Data loss
  15. ▹ Defacement
  16. ▹ Disinfect machine with a live CD
  17. ▹ Disposal
  18. ▹ Email
  19. ▹ Firewall
  20. ▹ Human error
  21. ▹ IDS/IPS
  22. ▹ Image rights
  23. ▹ Impact
  24. ▹ Integrity
  25. ▹ Internet and copyright
  26. ▹ Legal Aspects
  27. ▹ LuxTrust
  28. ▹ Malicious Codes
  29. ▹ Malicious websites
  30. ▹ Network segmentation
  31. ▹ Password
  32. ▹ Patches
  33. ▹ Phishing
  34. ▹ Physical faults
  35. ▹ Securing a fixed workstation
  36. ▹ Physical theft
  37. ▹ Recommendations for securing a file server
  38. ▹ Recommendations to secure a server connected to Internet
  39. ▹ Recommendations to secure a Web server
  40. ▹ Removable devices
  41. ▹ Risk processing
  42. ▹ Spam – unwanted emails
  43. ▹ SSL/TLS – encryption technologies on the web
  44. ▹ Update softwares with Secunia PSI
  45. ▹ Security Charter
  46. ▹ Social engineering
  47. ▹ Threat
  48. ▹ Virtual Private Networks (VPNs)
  49. ▹ Vulnerabilities
  50. ▹ Web of Trust - WOT
  51. ▹ Web filter – Proxy
  52. ▹ Why is it important to protect your computer?

Cybercriminals

In brief

A cybercriminal is a person who attempts an illegal attack on a particular computer system or who commits a conventional offence or crime using a computer tool or system.

Cybercrime in the past and present

Over the past decade, we have witnessed a shift in the world of cybercrime. In the 1980s and 1990s this was still an amateur activity on the part of computer enthusiasts eager for recognition. Malware was apparent, it displayed animations on the screen or destroyed data on infected computers.

With the Internet proliferation of more and more economic activities, such as e-commerce or e-banking, the challenges have changed and more and more criminals have become interested in technology. Over the past decade, we have seen increasingly stealthy malware seeking to control computers for as long as possible.

A degree of specialisation has also developed: keyboard virtuosos have become experts in malware programming while others have focused on the recruitment of mules, money laundering and web page infections, etc. Every link in the network carries out its task diligently and we can nowadays talk about well-oiled organised crime.

This phenomenon is exacerbated by the very low risk and the possibility of very high gains. From the smallest Nigerian scammer to the godfather who runs an entire organisation, the market has enough capacity for everyone and some reports today claim that cybercrime is one of the most lucrative criminal activities.

Domain actors

In general the press talks about pirates or “hackers”, although the latter term should basically be reserved for enthusiasts who try to use existing technology for fun or useful purposes, deviating them from their primary use. In many insider circles, the term “hacker” has a positive and creative connotation, even if nowadays it is often used pejoratively.

To be more precise, it would be necessary to speak of:

  • “white hat”, a specialist in computer security using their knowledge for beneficial purposes;
  • “black hat”, a specialist in computer security using their knowledge for criminal purposes;
  • “grey hat”, somebody who sometimes resorts to unorthodox or even illegal methods for beneficial purposes.

Along with these are script-kiddies, usually beginners in the field, who use the tools of others, as well as many actors with little or no computer skills. The latter for the most part engage in scams, hoaxes or other spam of all kinds. Finally, the parallel cybercrime economy is swarming with recruiters and other criminal accessories.

Table of Contents