--:-- --
↓ Scroll for more

Unit 9.3

Computer Sabotage and Cybercrime

IT 231: IT and Application

Learning Objectives 🎯

By the end of this chapter, you will be able to:

  • ✅ Define computer sabotage and cybercrime.
  • ✅ Differentiate between hackers, crackers, and other types of cybercriminals.
  • ✅ Identify common types of computer crime.

Defining the Core Concepts

Computer Sabotage

Any act of malicious destruction or disruption to a computer system.

Example: Deleting critical files from a company server.

Cybercrime

A broader term for any crime that involves a computer and a network.

Example: Online fraud, identity theft, or distributing malware.

All computer sabotage is a form of cybercrime, but not all cybercrime is sabotage.

Types of Perpetrators 🎭

Understanding who commits cybercrime is key to defending against it. Let's look at the main categories:

  • Hacker: The original creative programmer.
  • Cracker: The malicious actor.
  • Script Kiddie: The amateur attacker.
  • Insider: The trusted employee-turned-threat.

Perpetrators: Hacker vs. Cracker

Hacker 👨‍💻

  • Originally, a term for a creative, skilled programmer who enjoyed exploring system limits.
  • Today, the media often uses it to mean any cybercriminal.
  • In security, "ethical hackers" are hired to find vulnerabilities.

Cracker 💀

  • A person who breaks into a computer system with malicious intent.
  • Their goals include stealing data, causing damage, or financial gain.
  • This is the term for a "malicious hacker."

Key Difference: Intent. A cracker is a hacker with malicious intent.

Perpetrators: Script Kiddie & Insider

Script Kiddie 🎮

  • An amateur attacker with little technical skill.
  • Uses pre-made tools and scripts created by others to launch attacks.
  • Often motivated by curiosity, bragging rights, or causing minor chaos.

Insider 👤

  • An employee, former employee, or contractor with authorized system access.
  • Uses their legitimate access for malicious purposes.
  • Often considered the most dangerous threat because they are already inside the security perimeter.

Common Types of Computer Crime ⚡

Cybercriminals use a variety of techniques. Here are some of the most common:

Malware

Malicious software (viruses, ransomware, etc.) designed to disrupt or damage. (Covered in the next unit!)

Denial-of-Service (DoS)

Flooding a server with traffic to make it unavailable to legitimate users.

Phishing

Tricking users into revealing sensitive information like passwords or credit card numbers.

Crime in Focus: Denial-of-Service (DoS)

Denial-of-Service (DoS) Attack: An attempt to make a machine or network resource unavailable to its intended users.

Simple Analogy:

Imagine one person trying to enter a shop. Easy.

Now imagine 10,000 bots all trying to cram through the same door at once. The real customer can't get in. The service is denied.

[Legitimate User] ---> [✅ Server Online]

[Attacker Bots] ===> [💥 Server Overwhelmed & Offline]

Crime in Focus: Phishing 🎣

Phishing: An attempt to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity.

Common Signs of a Phishing Email:

  • 🚨 Urgent, threatening language ("Your account will be suspended!")
  • 👤 Vague greetings ("Dear Valued Customer")
  • ✍️ Spelling and grammar mistakes
  • 🔗 Links that don't match the supposed sender's domain

Practical Application: Phishing in Nepal 🇳🇵

Case Study: e-Wallet & Banking Scams

  • Scammers frequently target users of popular Nepali services like eSewa, Khalti, and major banks.
  • They send SMS or social media messages with a fake warning: "Your KYC is not updated! Click here to verify your account."
  • The link leads to a fake login page that looks identical to the real one.
  • Once you enter your details, the scammers steal them and drain your account.

Lesson: Always be suspicious of unsolicited messages. Manually type the website address into your browser instead of clicking links.

Chapter Summary & Key Takeaways 📊

Let's review the most important points from this chapter.

  • Cybercrime is any crime involving a computer and a network, while sabotage is specifically about destruction or disruption.
  • A cracker is a hacker with malicious intent. They are distinct from amateurs (script kiddies) and dangerous insiders.
  • DoS attacks overwhelm a system to make it unavailable.
  • Phishing uses deception and social engineering to trick you into giving up sensitive information.

Thank You

Any Questions?


Next Topic: Unit 9.5 - Malware Deep Dive

Back to IT 231 Course Notes