Skip to content. | Skip to navigation

You are here: Home IT - (Instructional Computing and Information Technology) IT Security Cyber Security Month 2016 Recognizing and Combating Cybercrime

Recognizing and Combating Cybercrime

Week 3: October 17-21, 2016

Week 3 focuses on the signs of criminal intent through technology and what individuals can do to detect and prevent cybercrime.

The hash tag for NCSAM will be #CyberAware we encourage you to use this both before and during the month of October to promote your organization’s involvement in raising cybersecurity awareness.

What is “Cybercrime”?

In a nutshell, it is simply a crime that uses computers or networking to accomplish an illegal end.

Facts (excerpted from Norton/Symantec):

    • Cybercrime has now surpassed illegal drug trafficking as a criminal moneymaker
    • Somebody’s identity is stolen every 3 seconds as a result of cybercrime

Some of the different types of cybercrime:
       •Theft of personal data                       •Copyright infringement                        •Cyberstalking
       •Fraud                                                •Child pornography                                -Bullying

Do you have children? The Alicia Project has important points for parents to help their kids avoid being a victim of stalking and abuse as a result of online activity.

The FBI focuses on domestic cybercrime while the US Secret Service oversees international cyber criminals and computer-related crimes. Among the FBI priorities are:
       •Computer and Network Intrusions                       •Ransomware                      •Identity Theft                     •Online Predators

To submit an complaint, go to the Internet Crime Complaint Center (IC3)

Resources at Hunter College

The ICIT Security website has tips and information on protection and reporting of the more common issues found at the College. Click here to go to the top level of the IT Security website.

People at the College are most susceptible to:

Phishing: an attempt to gain your personal information (passwords, Social Security number, etc.) by creating a false sense of urgency and loss. To learn more about Phishing click here.

Copyright infringement: sharing or use of content outside of acceptable use or license. This can happen unintentionally, as when using a file which someone else has posted in violation of copyright, such as P2P sharing of movies and videos. For more information see: Protect myself (students) and CUNY's Policies on File Sharing and Copyright Infringement .

Ransomware: hacking your computer to disable your ability to control it or to access files, and requiring a payment to recover your access (usually via digital currency).


Some of the steps ICIT has taken include:

  • Starting September 2016, the ICIT Security Notices web application lists all security notices and has an email subscription list and RSS feed for updates regarding security issues relevant to the College.
  • If you believe you are a victim of intrusion or malware, report it to ICIT via webform or by contacting the Helpdesk.
  • In the case of copyright infringement, ICIT will identify the device and person responsible and take appropriate action.
Document Actions
IT - (Instructional Computing and Information Technology) website feedback:
Hunter College 695 Park Avenue NY, NY 10065 212.772.4000
212-772-5799 | email us
695 Park Ave
NY, NY 10065