Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.

Similar presentations

Presentation on theme: "Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography."— Presentation transcript:


2 Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.(‘’)

3 Classification of Cyber Crimes: 1.Against individuals -Their person -Their property of an individual. 2.Against an organization -Government -Firm, -Company -Group of Individuals 3. Against the society at large

4 1. Against Individuals: -Harassment via e-mails -Cyber-stalking -Dissemination of obscene material -Defamation -Unauthorized control/access over computer system  -Indecent exposure -Email spoofing -Cheating & Fraud

5 2. Against Individual Property: -Computer vandalism -Transmitting virus - Netrespass -Unauthorized control/access over computer system -Intellectual Property crimes - Internet time thefts Against an Organization: -Unauthorized control/access over computer system -Possession of unauthorized information -Cyber terrorism against the government organization -Distribution of pirated software

6 3. Against the Society at large: -Pornography (basically child pornography) -Polluting the youth through indecent exposure -Trafficking -Financial crimes -Sale of illegal articles -Online gambling -Forgery

7 Types of Offenses that distinguishes Cybercrime from other Online Violations: 1.offences against the confidentiality, integrity and availability of computer data and systems; offences; 3.content-related offences 4.copyright-related offences

8 The Department of Justice categorizes computer crime in three ways: 1.The computer as a target - attacking the computers of others (spreading viruses is an example). 2.The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). 3.The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.

9 How To Prevent Cyber Crime: 1.Education and Training -Understand and analyze security policies -Awareness of common cyber crime issues -Know the consequences of faulty actions

10 How To Prevent Cyber Crime: 1.Securing Computers, Digital Assets, and Networking -All software housed within your network continually be up to date -Have an anti-virus and anti- malware -Have reliable backups of all of your critical data

11 SPAM: -Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. FRAUD: -Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. Forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. A variety of Internet scams target consumers direct.

12 PHISHING: -It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means. OBSCENE OR OFFENSIVE CONTENT: -Content considered by some to be objectionable exists in abundance in cyberspace. -This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of incendiary and explosive devices. -In some instances these communications may be illegal.

13 HARASSMENT: -It involves violating the privacy of another person by using the Internet -Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation -This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Any comment that may be found derogatory or offensive is considered harassment

14 -Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat- rooms frequented by the victim, constantly bombarding the victim with emails etc TRAFFICKING: -Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms, weapons etc. -Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e- mail and other Internet Technology. - Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.

15 PIRACY: -Piracy is the act of copying copyrighted material -It involves the use of the Internet to market or distribute creative works protected by copyright -This has caused considerable concern to owners of copyrighted material. Each year, it has been estimated that losses of between US$15 and US$17 billion are sustained by industry by reason of copyright infringement HACKING: -It is hacking websites -This may be done for personal notoriety, the challenge, or a political message just as with traditional defacement of property. It can also include hacking into computer networks

16 VIRUSES: -Viruses are sent to other peoples computers to gain access to their personal information and to eventually destroy their hard drive. -To combat viruses, companies and individuals can purchase anti-virus software for their computer, avoid downloading anything unless they know the source is completely safe and not open emails from anyone they do not know


Download ppt "Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography."

Similar presentations

Ads by Google