It is easy to access the internet in this digital era and it offers many ways to explore the virtual world where, unlike the real world, everything is easily accessible. It opens a new world and is coming along with lots of advantages but also many risks.
Inappropriate content
There are tons of contents on the internet and not all of this contents are socially acceptable nor are they classified by age or area. Some content may be illegal, inappropriate, offensive, or unsuitable for some age groups. Anyone can find inappropriate, disturbing, or explicit content, even small children without supervision.
Many disturbing websites are not ‘illegal’ which means that no one monitors and manages their content. Some of these contents are pornography, violence, dangerous products (such as weapons), racism or hate, pro-ana sites (promote anorexia), or other sites with extremist content.
Data theft
Financial or personal information is stolen through the use of computers, server and other electronic devices in order to obtain some benefit or harm the victim. Cyber thieves can target banks, corporations, and individuals. It is an illegal act of obtaining sensitive data, which includes unencrypted also credit card numbers, bank account details of individuals, passwords, information stored in businesses, trade secrets, intellectual property, source code, customers’ information, or employee records.
The cybercriminal can access these users’ computers through spyware, which is a software that enables a user to obtain information about another’s computer activities.
Identity theft
Identity theft is the act of stealing personal identification information to commit illegal acts.
In the first phase, the offender acquires a foreign computer identity. This is most often done by stealing electronic data (passwords, access data, etc.), usually by unauthorised copying (skimming), deceitful phishing, or hacking.
In the second phase, the perpetrator misuses the identity for own benefit to harm the victim. For example by acting under its name in social networks such as Facebook. It is the act of stealing personal identification information to commit illegal acts, such as: opening a credit line, renting a house, purchasing goods or services, auction- and wage-related fraud or extortion.
Unwanted attention
This kind of attention could come from someone who is simply obsessed with the victim (cyberstalking) or someone whose intention is to harm the victim (cyberbullying).
On the one hand, Cyberstalking is unwanted obsessive attention to a specific person through the internet. It is committed via online technology such as e-mail, social networks, instant messaging, personal data available online – everything on the Internet can be used by cyberstalkers to make inappropriate contact with their victims. Some ways are following the person online, looking for personal information in an obssesive way, secretly watching online , persistent calling and texting to manipulate, and different other means to approach the victim unexpectedly.
On the other hand, cyberbullying is a crime that occurs when people use social media or the internet to intimidate, harass, threaten, or belittle others.
Scams and tricks
One type of scam or trick would be phishing. It is a practice of sending fraudulent communications that appear to come from a trustable source, usually through e-mail.
These communications can include malware (spyware, ransomware, viruses and worms), which usually happens due to dangerous clicks or email attachment that then installs risky software.
Unwanted information
Using the Internet we can end up finding information that we weren’t looking for or false information or profiles. You can find misleading information either instead of what you were looking for or without requesting.
The most popular online communication medium is e-mail. It is very common to use it in our daily routine and that is why this is one of the favourite mediums for spam. Fake e-mails are a common threat, but you can also reaceive these kind of misleading informartion through social networks messages or different websites.
Moreover, fake news can be found everywhere, not only when using the e-mail. On social media it is very common to find not only fake news but also fake identities.
Easy spreading and long staying
Information such as photos, news, etc., can be uploaded anytime, anywhere and by anyone. Once, the information is online, it remains there forever so you must be very careful with the information that you share online.
It is also very easy to spread it all around the world and in a short period of time.
Destruction or modification of data
Important data can be destroyed or modified in the user’s computer in order to harm.
One way could be through viruses, which are computer programs designed to infect other computer programs, destroying essential system data and making networks inoperable. Another example could be trojans, which are computer programs that get access to a computer or system that is camouflaged in the form of regular software in order to cause damage to system processes, hard drive data, etc.
Disabling the device
The computer’s operating system device can be attacked by a trojan. It is a computer program that gets access to a computer or system.
Trojans are camouflaged in the form of regular software in order to cause damage to system processes, hard drive data, etc. Mostly introduced via e-mail attachments.
Cyberterrorism
Cyberterrorism is always more severe than other behaviors that are carried out in or through cyberspace.
This kind of crime is a cyberattack that aims to generate fear or intimidate society with an ideological goal. For this purpose, the terrorist uses computers or communication networks to cause enough destruction or disruption.
It is easy to access the internet in this digital era and it offers many ways to explore the virtual world where, unlike the real world, everything is easily accessible. It opens a new world and is coming along with lots of advantages but also many risks.
There are tons of contents on the internet and not all of this contents are socially acceptable nor are they classified by age or area. Some content may be illegal, inappropriate, offensive, or unsuitable for some age groups. Anyone can find inappropriate, disturbing, or explicit content, even small children without supervision.
Many disturbing websites are not ‘illegal’ which means that no one monitors and manages their content. Some of these contents are pornography, violence, dangerous products (such as weapons), racism or hate, pro-ana sites (promote anorexia), or other sites with extremist content.
Financial or personal information is stolen through the use of computers, server and other electronic devices in order to obtain some benefit or harm the victim. Cyber thieves can target banks, corporations, and individuals. It is an illegal act of obtaining sensitive data, which includes unencrypted also credit card numbers, bank account details of individuals, passwords, information stored in businesses, trade secrets, intellectual property, source code, customers’ information, or employee records.
The cybercriminal can access these users’ computers through spyware, which is a software that enables a user to obtain information about another’s computer activities.
Identity theft is the act of stealing personal identification information to commit illegal acts.
In the first phase, the offender acquires a foreign computer identity. This is most often done by stealing electronic data (passwords, access data, etc.), usually by unauthorised copying (skimming), deceitful phishing, or hacking.
In the second phase, the perpetrator misuses the identity for own benefit to harm the victim. For example by acting under its name in social networks such as Facebook. It is the act of stealing personal identification information to commit illegal acts, such as: opening a credit line, renting a house, purchasing goods or services, auction- and wage-related fraud or extortion.
This kind of attention could come from someone who is simply obsessed with the victim (cyberstalking) or someone whose intention is to harm the victim (cyberbullying).
On the one hand, Cyberstalking is unwanted obsessive attention to a specific person through the internet. It is committed via online technology such as e-mail, social networks, instant messaging, personal data available online – everything on the Internet can be used by cyberstalkers to make inappropriate contact with their victims. Some ways are following the person online, looking for personal information in an obssesive way, secretly watching online , persistent calling and texting to manipulate, and different other means to approach the victim unexpectedly.
On the other hand, cyberbullying is a crime that occurs when people use social media or the internet to intimidate, harass, threaten, or belittle others.
One type of scam or trick would be phishing. It is a practice of sending fraudulent communications that appear to come from a trustable source, usually through e-mail.
These communications can include malware (spyware, ransomware, viruses and worms), which usually happens due to dangerous clicks or email attachment that then installs risky software.
Using the Internet we can end up finding information that we weren’t looking for or false information or profiles. You can find misleading information either instead of what you were looking for or without requesting.
The most popular online communication medium is e-mail. It is very common to use it in our daily routine and that is why this is one of the favourite mediums for spam. Fake e-mails are a common threat, but you can also reaceive these kind of misleading informartion through social networks messages or different websites.
Moreover, fake news can be found everywhere, not only when using the e-mail. On social media it is very common to find not only fake news but also fake identities.
Information such as photos, news, etc., can be uploaded anytime, anywhere and by anyone. Once, the information is online, it remains there forever so you must be very careful with the information that you share online.
It is also very easy to spread it all around the world and in a short period of time.
Important data can be destroyed or modified in the user’s computer in order to harm.
One way could be through viruses, which are computer programs designed to infect other computer programs, destroying essential system data and making networks inoperable. Another example could be trojans, which are computer programs that get access to a computer or system that is camouflaged in the form of regular software in order to cause damage to system processes, hard drive data, etc.
The computer’s operating system device can be attacked by a trojan. It is a computer program that gets access to a computer or system.
Trojans are camouflaged in the form of regular software in order to cause damage to system processes, hard drive data, etc. Mostly introduced via e-mail attachments.
Cyberterrorism is always more severe than other behaviors that are carried out in or through cyberspace.
This kind of crime is a cyberattack that aims to generate fear or intimidate society with an ideological goal. For this purpose, the terrorist uses computers or communication networks to cause enough destruction or disruption.