e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
By Andy Scott, Michael Murray and Adam Kanopa
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Security, Privacy, and Ethics Online Computer Crimes.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Viruses & Destructive Programs
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Possible WebQuest type links  
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
CYBER CRIME. WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed.
Cyber crime & Security Prepared by : Rughani Zarana.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Mrs. Jefferson Business Information Management I.
Unethical use of Computers and Networks
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
CYBER CRIME.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Lesson 15 : Networks And The Internet
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Technology: Friend or Foe? Thinking about Information Ethics.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
GCSE ICT SECURITY THREATS.
Chapter 19.1 Cyberlaw and Cybercrime
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 11 crime and security in the networked economy
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
BCT 2.00 Analyze Technology Issues
ethical issues in business
Unit 6 Digital Literacy Study S3 Obj 2-2
Information Technology Topic: The internet
Unit 6 Digital Literacy Study S3 Obj 2-2
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083

cyber crimes Big increase in cyber crimes (The Star 27 Apr 2011) KUALA LUMPUR: There has been an increase in cyber crimes in Malaysia over the last two years, more than 3,500 of them reported in the first three months of this year. CyberSecurity Malaysia chief operating officer Zahri Yunos said some 8,000 cases were reported last year and attributed this to the growth in Internet usage and broadband penetration that now stood at 55%.

What is cyber crime? Also known as computer crime,digital crime, e-crime and electronic crime

Examples of cyber crimes intrusion Internet banking fraud harrasment Intellectual property infringement

More example cyber crime Identify Theft Some criminals use the Internet to break intovictims' online financial accounts, taking passwords, money and sensitive information Computer Viruses Computer hackers are digital age criminals that can bring down large infrastructures with a single keystroke emitting a computer virus

Reasons for cyber crime For financial means Purely out of mischief To signal some form of protest Purely to pursue criminal activities Revenge on someone they hate To forge documents Identity theaf

Property infringements and legal right Software piracy That action against the law when the employees install the same programme on multiple using software for which one license agreement was paid. -freeware and shareware Freeware allow you copy or download without payment Share ware is a software that canused by everyone for free for a limited time period only -treacherous Cyber​​-vandals like to change the public site and display the information and how it canbe done by hackers as disloyal are interpreted to severe penalties. -stolen If the contractor can access via the Internet to other users' information such as personal data, lists, records, personal s, even with good intentions can be defined as theft

Tentang masalah jenayah siber

Jenayah Siber di Malaysia Naik 100% 13 Januari 2009 (Harian Metro) PULAU PINANG 25 Julai – Sebanyak 6,167 kes penipuan dalam Internet melibatkan nilai kerugian RM63 juta dilaporkan di negara ini sepanjang tahun lalu.Ia meningkat empat kali ganda dalam tempoh empat tahun berbanding pada 2007 yang hanya mencatatkan 1,139 kes dengan nilai RM11.4 juta. (Sumber: 2011&dt=0726&pub=Utusan_Malaysia&sec=Jenayah& pg=je_01.htm) 2011&dt=0726&pub=Utusan_Malaysia&sec=Jenayah& pg=je_01.htm

Kesan jenayah siber Kerugian wang ringgit. Ini kes biasa yang berlaku di internet. Contohnya ditipu melalui chatting room Yahoo Messenger. Maruah diri tercemar. Contoh mudah apabila video dan gambar kurang elok tersebar meluas oleh orang yang tidak bertanggungjawab. Kestabilan politik tergugat. Contoh paling mudah apabila seorang remaja menghina lagu NegaraKu, maka tersebar ke segenap pelusuk dunia