Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.

Similar presentations


Presentation on theme: "COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS."— Presentation transcript:

1

2 COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.

3 DO YOU KNOW ANYTHING ABOUT COMPUTER CRIMES? 1

4 YES OR NO 2

5 INTRODUCTION Although the technology have been improve from year to year but there are still have some individual outside involve in cyber crime. These cases have become major problem because most of the cybercrime activities are very difficult to solve it. With access to the Internet, some people will try to do malicious damage on computer and data stored in the computer. 3

6 COVERT MESSAGES Many different types of cyber crimes Cyber bullying- beware of what we comment in communication website, tell parents if fallen victim Downloads- make sure it is legal Computer virus- must know what action to take to protect our computers Must know how to protect ourselves from cyber crimes 4

7 PHISHING What is phishing? to obtain case sensitive information like password and username How it happen? sending an email to unsuspecting clients, posing as an agent of banks Prevention checking the authenticity of banks website before entering their information 5

8 HACKING What is hacking? gain access into a user’s computer system without the user’s knowledge What they obtain? passwords to bank account, company’s data, and private information Example: hacking of IP addresses to slow down or confused enforcement 6

9 What is communication piracy? Some people copyright materials from others for their personal use. Examples of communication piracy? Downloading music, movies, and so on. Implication on the creator? The creators are unable to get their profit and had financial lost from their creation. COMMUNICATION PIRACY 7

10 What is electronic fund transfer fraud? An illegal action which transfer money without customer realize How is the modus operandi? Criminals created Trojan viruses that steal online banking log-in when customer sign on to their financial institution’s Phishing e-mails which trick consumers into giving away their bank login information or other personal data. How to overcome the problem? to educate the customer on various issues like the risk of phishing, where the fraudsters set up a fake page that appears to be part of bank website. ELECTRONIC FUND TRANSFER FRAUD 8

11 ELECTRONIC VANDALISM, EXTORTION AND TERRORISM Electronic Vandalism An invasion to interfere operating system functions to damage the content and system. They also tore all that posted on the computer, doodle and stole computer equipment of expensive computer hardware Electronic Extortion Electronic extortion is a criminal offence which when a person unlawfully obtain property from person using electronic They are often disguised as other individuals using the names and photographs of other individuals for a particular purpose. 9

12 Electronic Terrorism A form of threat or attack on the computer, or network connections and data of information stored and protected by government or private. The security weakness provide a platform for computer hackers, intruders and identity thieves broke into the traffic to a computer system. Steal data important, such as credit card passwords, account number, and all personal information. 10

13 CONCLUSION Computer crime is everyone’s problem. Information is the best form of protection. Prevention method to solve the problems:  set your Firewalls  frequently changing password or ID number  have a safe surfing.  frequently checking for virus.  on your Email filters such as pop up blocker 11

14 CREDIT  http://www.cartoonstock.com/newscartoons/cartoonists/gri/lowre s/grin699l.jpg http://www.cartoonstock.com/newscartoons/cartoonists/gri/lowre s/grin699l.jpg  http://www.techmaish.com/wp-content/uploads/2011/08/cyber- crime.jpg http://www.techmaish.com/wp-content/uploads/2011/08/cyber- crime.jpg  http://1.bp.blogspot.com/_kdrphzeOB5k/S6FwJldrdSI/AAAAAAAAB TQ/L29QMNLauoU/s400/261373070_e23d7f46fb.jpg http://1.bp.blogspot.com/_kdrphzeOB5k/S6FwJldrdSI/AAAAAAAAB TQ/L29QMNLauoU/s400/261373070_e23d7f46fb.jpg  http://georgiatechcomputerscience.com/wp- content/uploads/2011/08/what-is-computer-crime.jpg http://georgiatechcomputerscience.com/wp- content/uploads/2011/08/what-is-computer-crime.jpg  http://www.infoniac.com/uimg/computer-virus-skull-monitor.jpg http://www.infoniac.com/uimg/computer-virus-skull-monitor.jpg  http://computerspictures.net/computer-hacker-alert.jpg http://computerspictures.net/computer-hacker-alert.jpg  http://usrlib.info/wp-content/uploads/2011/11/The-Emerging- Threat-of-Cyber-Terrorism.jpg http://usrlib.info/wp-content/uploads/2011/11/The-Emerging- Threat-of-Cyber-Terrorism.jpg 12


Download ppt "COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS."

Similar presentations


Ads by Google