Table of
Contents
What is Types of
How do How to
Cyber Cyber
they occur? prevent it?
Crime? Crime
Acknowledge How are they Hacking 6
ment about occuring? recommende
cyber crime Phishing d ways to
Global prevent
Cybersecurit Malware yourself
y Index (GCI) from
Identity victimisation
Theft
All about Cyber
01 Crime 02
Cyber crimes can be
Cyber crimes involve
illegal activities committed from
using computers, anywhere in the world,
digital devices, or making it challenging
networks. for law enforcement
03 04
The impact can be severe, Cyber criminals
leading to financial loss, continuously develop
data breaches, and new techniques and
emotional distress. tools, requiring
constant adaptation in
cybersecurity
How do
Cybercrimes
Cybercrimes occur through various
methods, exploiting vulnerabilities in
occur?
computer systems and networks.
Here are some key points:
Phishing and Ransomware:
Cybercriminals often use phishing
emails to trick users into revealing
sensitive information or installing
malware. Ransomware attacks
encrypt files and demand payment
for decryption.
Email-Based Attacks: Over 75% of
targeted cyberattacks start with an
email1. These can lead to data
breaches, financial losses, or
system compromise.
Tech Support Fraud: In 2020, the FBI
received 15,421 internet crime
complaints related to tech support
fraud1. Scammers pose as tech
support agents to deceive victims.
Global Costs: Global cybercrime costs
are expected to reach $10.5 trillion
annually by 2025. More than half of
all consumers have experienced a
cybercrime.
Physical Harm: Recent incidents show
that cyberattacks can cause physical
harm. For instance, a ransomware
attack led to the first reported death
in a hospital in Germany
S U M M A R
Y
Analysing
Global Cyber
Crime Index
Of
Recent Years
The concentration or frequency of cyber
incidents within a specific context. It provides
insights into risk exposure and aids in
prioritizing security measures.
ANALY
SE
Hacking
H
• Unauthorized access to computer
systems or networks to steal,
alter, or destroy data. This can
include activities like breaking
into systems to steal sensitive
information or to disrupt
operations
Phishing
• Fraudulent attempts to obtain
sensitive information such as
P
usernames, passwords, and
credit card details by disguising
as a trustworthy entity in
electronic communications1
•
Malware
Malicious software designed to
harm, exploit, or otherwise
compromise a computer system.
This includes viruses, worms,
Trojans, ransomware, and
spyware
M
I IDENTITY THEFT
• Stealing personal information
such as names, addresses, and
social security numbers to
fraudulently assume someone’s
identity, often for financial gain
Prevention
Methods
Consider trusted Avoid repeating passwords Regularly update your
security software like across different sites. Create operating systems and
Norton 360 with complex passwords with a mix internet security
LifeLock Select, which of at least 10 letters, numbers, software. Cybercriminals
provides comprehensive and symbols. Consider using a often exploit known
protection for your password management vulerbilities in outdated
devices, online privacy, application to keep them software.
and identity. secure.
Prevention
Methods
Secure your Wi-Fi Avoid opening attachments Stay informed about the
network with a strong from unknown sources or latest cyber threats and
password, enable WPA3 clicking on suspicious links. best practices.
encryption, and change Verify requests for personal Awareness is key to
default router information directly with preventing cybercrime.
credentials. Regularly companies an be mindful of
check connected devices the website URLs.
for security updates.