Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 19.1 Cyberlaw and Cybercrime

Similar presentations


Presentation on theme: "Chapter 19.1 Cyberlaw and Cybercrime"— Presentation transcript:

1 Chapter 19.1 Cyberlaw and Cybercrime
Business Law II Chapter 19.1 Cyberlaw and Cybercrime

2 Introduction to CyberCrime

3 Development of Cyberlaw
Cyberlaw– the area of law which concerns computers and computer-related crimes Cybercrime—any criminal activity associated with a computer

4 Two approaches to develop cyberlaw:
Cybertrespass Approach (or computer trespass) Any illegal activity already in the criminal code committed by using a computer Rewriting of Criminal Code Some states have written statutes for every crime that can possibly be committed by using a computer This is difficult since each new statute must be individually created by state legislature

5 Cybercrimes Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing) False s, false websites They attempt to lure people and obtain personal information of their victims Cyberpiracy: Using a computer to steal data stored in digital format (intellectual property theft)

6 Cybercrimes Cont. 3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff Users who spend time in chat rooms are vulnerable Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money

7 CyberCrimes Cont. Identity Theft—using computer to steal financial, employment, educational, medical, and personal information Attempt to obtain credit card numbers, PINS, SSN, access codes, etc. Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life. Cyberterrorism—using computer person interrupts national infrastructure Powergrids, air traffic control system, and the national defense

8 Cybercrimes Cont. Cybervandalism—disrupting, damaging, or destroying web site or computer network Hackers- usually done for revenge or to attack a business Cybergerm Warfare—transmit computer virus to destroy others computer files/systems Firewalls and anti-virus software can sometimes block many viruses

9 Cybertorts Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime Cyberdefamation—communication via computer or other electronic device of false data to damage person’s reputation Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer

10 NCIS American Special Agent Documentary on Computer Crime

11 Cyber Assess What crime involved using a computer to obtain a payoff? What crime involved disrupting infrastructure? What crime involves using a computer to steal financial, employment, or personal information?


Download ppt "Chapter 19.1 Cyberlaw and Cybercrime"

Similar presentations


Ads by Google