Unit 9.3
Computer Sabotage and Cybercrime
IT 231: IT and Application
Learning Objectives 🎯
By the end of this chapter, you will be able to:
- ✅ Define computer sabotage and cybercrime.
- ✅ Differentiate between hackers, crackers, and other types of cybercriminals.
- ✅ Identify common types of computer crime.
Defining the Core Concepts
Computer Sabotage
Any act of malicious destruction or disruption to a computer system.
Example: Deleting critical files from a company server.
Cybercrime
A broader term for any crime that involves a computer and a network.
Example: Online fraud, identity theft, or distributing malware.
All computer sabotage is a form of cybercrime, but not all cybercrime is sabotage.
Types of Perpetrators 🎭
Understanding who commits cybercrime is key to defending against it. Let's look at the main categories:
- Hacker: The original creative programmer.
- Cracker: The malicious actor.
- Script Kiddie: The amateur attacker.
- Insider: The trusted employee-turned-threat.
Perpetrators: Hacker vs. Cracker
Hacker 👨💻
- Originally, a term for a creative, skilled programmer who enjoyed exploring system limits.
- Today, the media often uses it to mean any cybercriminal.
- In security, "ethical hackers" are hired to find vulnerabilities.
Cracker 💀
- A person who breaks into a computer system with malicious intent.
- Their goals include stealing data, causing damage, or financial gain.
- This is the term for a "malicious hacker."
Key Difference: Intent. A cracker is a hacker with malicious intent.
Perpetrators: Script Kiddie & Insider
Script Kiddie 🎮
- An amateur attacker with little technical skill.
- Uses pre-made tools and scripts created by others to launch attacks.
- Often motivated by curiosity, bragging rights, or causing minor chaos.
Insider 👤
- An employee, former employee, or contractor with authorized system access.
- Uses their legitimate access for malicious purposes.
- Often considered the most dangerous threat because they are already inside the security perimeter.
Common Types of Computer Crime ⚡
Cybercriminals use a variety of techniques. Here are some of the most common:
Malware
Malicious software (viruses, ransomware, etc.) designed to disrupt or damage. (Covered in the next unit!)
Denial-of-Service (DoS)
Flooding a server with traffic to make it unavailable to legitimate users.
Phishing
Tricking users into revealing sensitive information like passwords or credit card numbers.
Crime in Focus: Denial-of-Service (DoS)
Denial-of-Service (DoS) Attack: An attempt to make a machine or network resource unavailable to its intended users.
Simple Analogy:
Imagine one person trying to enter a shop. Easy.
Now imagine 10,000 bots all trying to cram through the same door at once. The real customer can't get in. The service is denied.
[Legitimate User] ---> [✅ Server Online]
[Attacker Bots] ===> [💥 Server Overwhelmed & Offline]
Crime in Focus: Phishing 🎣
Phishing: An attempt to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity.
Common Signs of a Phishing Email:
- 🚨 Urgent, threatening language ("Your account will be suspended!")
- 👤 Vague greetings ("Dear Valued Customer")
- ✍️ Spelling and grammar mistakes
- 🔗 Links that don't match the supposed sender's domain
Practical Application: Phishing in Nepal 🇳🇵
Case Study: e-Wallet & Banking Scams
- Scammers frequently target users of popular Nepali services like eSewa, Khalti, and major banks.
- They send SMS or social media messages with a fake warning: "Your KYC is not updated! Click here to verify your account."
- The link leads to a fake login page that looks identical to the real one.
- Once you enter your details, the scammers steal them and drain your account.
Lesson: Always be suspicious of unsolicited messages. Manually type the website address into your browser instead of clicking links.
Chapter Summary & Key Takeaways 📊
Let's review the most important points from this chapter.
- Cybercrime is any crime involving a computer and a network, while sabotage is specifically about destruction or disruption.
- A cracker is a hacker with malicious intent. They are distinct from amateurs (script kiddies) and dangerous insiders.
- DoS attacks overwhelm a system to make it unavailable.
- Phishing uses deception and social engineering to trick you into giving up sensitive information.