Cybercrime Prevention, Reporting, & Recovery
From GCA ACT
Jump to navigationJump to search
This page is your go-to resource for tackling the multifaceted challenges of cybercrime. With the digital world becoming increasingly integrated to everyday lives and business operations, understanding how to prevent, recognize, report, and recover from cyber threats is critical. This comprehensive page is structured into four essential sections encompassing the continuum of cybercrime remediation. Each section includes a curated list of cybersecurity tools tailored for everyday users, individuals requiring enhanced security, and organizations.
Prevent Whether you are an everyday user or in charge of an organization's IT apparatus, implementing cybercrime prevention tools is a no-brainer. For Everyday Cybersecurity this includes using strong passwords, being careful about what information you share online, and being aware of common cybercrime scams. However sometimes a more structured approach, or Enhanced Protection, is needed for small businesses or individuals requiring heightened security. For large organizations Advanced Security is required, including sophisticated Intrusion Prevention Systems (IPS), security simulations, and strict access control.
|
Realize Cybercrimes can often go undetected but it is important to catch them before they cause further damage. Luckily, along with a number of resources for learning to spot cybercrimes, there are a multitude of automated software tools that intelligently detect anomalies.
|
Report If you are the victim of a cybercrime, it is important to report it to the authorities. This will help them to investigate the crime and track down the perpetrators. Cybercrimes are dramatically underreported, people are sometimes embarrassed, or they don’t think anyone will do anything. The truth is that authorities are investing more money in cybersecurity every year.
|
Recover Once you have reported a cybercrime, there are steps you can take to recover from it. A lot of the time these steps occur before the crime happens, like keeping a backup of your data or having a disaster recovery plan. Otherwise, it may include things like changing your passwords, monitoring your credit report, and filing insurance claims.
no subcategories |
Type of Cybercrime | Signals of Attack | Methods of Containment |
---|---|---|
Data breach - The unauthorized access and theft of sensitive data. |
|
|
Malware attack - The unauthorized installation of malicious software on a computer system. |
|
|
Phishing attack - A fraudulent attempt to obtain sensitive information, such as passwords or credit card numbers, by disguising oneself as a trustworthy entity in an electronic communication. |
|
|
Denial-of-service (DoS) attack - An attempt to make a computer system or network unavailable to its intended users by flooding it with traffic or exploiting vulnerabilities in software or hardware. |
|
|
Man-in-the-middle (MitM) attack - An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are communicating directly to each other. |
|
|
Social engineering attack - An attack that manipulates people into performing actions or divulging confidential information. |
|
|
Ransomware attack - A type of malware that encrypts the victim's data and demands a ransom payment in exchange for the decryption key) |
|
|
Cryptojacking - The unauthorized use of a computer's processing power to mine cryptocurrency. |
|
|
Insider threat - A cyberattack carried out by an individual who has authorized access to an organization's computer systems or data. |
|
|
Supply chain attack - A cyberattack that targets an organization's suppliers or third-party vendors. |
|
|