These are the crimes targeting institutions or users and committed through information systems.
Cybercrime emerges when a cybercriminal situation, such as illegally entering information systems, encrypting data, changing the place of capture, blocking access to systems, is performed electronically. It may seem simple, but it is a crime to access someone else's social media account or e-mail address without their knowledge and consent. Cyber crime is no different from crimes committed physically such as threats, blackmail, extortion.
When attackers generally commit cybercrime, they can damage many resources. At this point, the cyber security of the risks that may arise should be ensured. It comes across at many points such as:
Access to people's bank accounts,
Unauthorized access to data of individuals or institutions,
Attempts to damage reputation,
Attempts aimed at damaging illegally,
Attacks that will take the systems out of service.
People who are exposed to attacks can be partners in cybercrime and help commit crimes without knowing it.
Systems captured by cyber attackers;
Using ransomware and crypto systems
Assisting in the distribution of viruses or harmful applications
Being a part of botnet networks.
In such cases, unfortunately, many people or company employees who have been attacked are targeted as victims in these attacks and can also be used in attacks on other victims. As cybercriminals use many techniques to attack users' computers or data, they can gain access to systems that are unprotected at the cyber security point in a very short time.
At this point, the biggest risk is to be involved in BOTNET networks. Users who have become one of the botnet networks, on the other hand, support crimes committed unconsciously. Botnet networks are systems that consist of thousands of computers and are controlled by cyber hackers. In the attacks we call DDOS in general, it is a type of cyber attack that temporarily or indefinitely disrupts the services of a device or system connected to the Internet, preventing the access of a machine or network resources by the main users. Defined as one of the most dangerous types of attacks, these cyber attacks consist of zombie computers that have become a part of botnet networks.