This module is a resource for lecturers

Conclusion

Individuals, groups, and states can (and have) engaged in illegal access, interception, and interference with systems, networks, and data (i.e., by hacking, conducting DoS and DDoS attacks, and malware distribution). ICT has been the target of cybercriminals and has been used to facilitate cybercrimes. Just as there is no universal definition of cybercrime, there are also no universally accepted definitions of different types of cybercrime and general categories of cybercrime.

Next: References
Back to top