Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
General Awareness Training
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CYBER CRIME. WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
Mrs. Jefferson Business Information Management I.
Unethical use of Computers and Networks
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083.
Chapter 10: Crimes Against Property
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Security Precautions. Common Security Problems ShopliftingShoplifting PilferagePilferage BurglaryBurglary RobberyRobbery FraudFraud.
Chapter 27 Crime Insurance and Surety Bonds. Copyright ©2014 Pearson Education, Inc. All rights reserved.27-2 Agenda ISO Commercial Crime Insurance Program.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
GROUP : MOMENT SA’AD BIN SABAR FB MOHD NORSHAFIQ BIN MOHD PAUZI FB POSITIVE VALUES IN USING TECHNOLOGY.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Cybercrime What is it, what does it cost, & how is it regulated?
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Add video notes to lecture
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Cyber Crimes Chunlian QU 9/18/2018.
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Information Technology Topic: The internet
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Entering the World of Cybercrime
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar

* Cyber crime is also known as computer crime,digital crime,e-crime and electronic crime. * All indicated that the crimes are committed through the use of technology to intimidate people,commit fraud or steal valuable information.

* Internet banking fraud * Harassment * Intellectual property infringement * Intrusion * Offenses

* For persuit of fame and to gain reputation for intelligence or brilliance. * Purely out of mischief. * For financial means. * To get revenge on someone they hate/dislike. * To signal some form of protest. * Purely to pursue criminal activities. * To steal identify (identify theft). * To forge documents and messages.

 Loss of revenue/profits  It occurs when the company’s sensitive financial information is leaked or stolen and used by outside parties to illegally draw funds from its account.  Waste of valuable time  IT personnel will taste most of their valuable time to handle security breaches and other related problems caused by cyber crime.

 Damaged reputations  Customers will start to lose confidence in the ability of the company to take care of its security,thus the company’s reputation can be badly affected.  Reduced productivity  Because of the frequent occurrence of cyber crimes,many companies have begun to take measures in order to upgrade their security which includes requiring the employees to enter more passwords and security pins.As a result,employees are distracted from their work,resulting in decreases in productivity.

 Software piracy  Freeware and shareware  EULA

 People often share software they bought.Many employees install the same programme on multiple computers using software for which only one license agreement was paid.These actions are against the law.

 Freeware allows you to download,copy,pass on or use software without payment for a license and you are allowed to utilize it for as long as you like.However,it is still considered as the intellectual property of the developer.

 Is the license which comes with commercial software.It gives you the right to load or install the software on your computer legally,but you are prohibited from sharing and installing the software on other’s computers.