Now that you have gotten introduced to the myriad world of cybercrime and who are involved, it is time to take a closer look at exactly how cybercrimes propagate through cyberspace. It is very difficult to classify crimes in general into distinct groups as overlapping happens all too often. Even in the real world, crimes like rape, murder or theft need not necessarily be discrete. However, all cybercrimes involve both the computer and the person behind it as victims, it just depends on which of the two is the main target.
Hence, this section has been divided into crimes in which the computer is the target or it is the tool for simplicity’s sake. For example, cyberstalking and hacking both involve attacking the computer, but the main target of a cyberstalker is the victim, not the computer. It is important to take note that overlapping occurs in many cases and it is impossible to have a perfect classification system.
When the individual is the main target of the crime, the computer can be considered the tool rather than the target. These crimes generally involve less technical expertise as the damage done manifests itself in the real world. Human rather than mechanical weaknesses are generally exploited. The damage dealt is largely psychological and intangible, making legal action against the perpetrators all the more difficult.
Learn more >>>
These are the crimes which have existed for centuries. Stalking, scams, theft, underhanded business tactics, vandalism, social engineering, etc. have all merely been given a face-lift by the cybernetic age. The essential concepts and motives have remained largely unchanged. The same criminal has simply been given a tool which increases his potential pool of victims and makes him all the harder to trace and apprehend.
Learn more >>>