Discuss cybercrimes including creation of malicious programs such as viruses, worms,Â
Trojan horses, and zombies as well as denial of service attacks, Internet scams, identityÂ
theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
Cybersecurity
It should be noted that crimes committed against technological devices, such as the theft
or destruction of various types of computer systems, are not typically considered cyber crimes.
They may, however, serve as the impetus for these crimes. In general, cybercrime is divided into
two categories in the specific sense that has been discussed and legislated in the Islamic Republic
of Iran's laws and regulations:
Unauthorized access or tampering with data:
Unauthorized access or hacking occurs when someone gains unauthorized access to your
computer or device. Hacking can occur as a result of inadequate computer security, phishing, or
malware. They can sometimes gain access to them by altering their passwords in their email
accounts.
Malware:
Malware, such as viruses and spyware, is installed on your device and monitors your
every move, causing damage to your system. Malware is typically downloaded when you open
an unknown email attachment or click on a suspicious link. Malware is frequently used to collect
your username, password, and other sensitive information and send it to a third party.
Comments
Leave a comment