Presentation is loading. Please wait.

Presentation is loading. Please wait.

 It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either.

Similar presentations


Presentation on theme: " It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either."— Presentation transcript:

1

2  It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either A tool or target or both”.  Cyber crime offenses against the information technology infrastructure

3  Such conducts includes: -Illegal access -Illegal interception -System interference -Data interference -Misuse of device -Fraud -Forgery

4  The computer as a target using a computer to attack other computers. Hacking, virus/worm attacks, DoS(Denial of Service) attack etc.  The computer as a weapon using a computer to commit real world crimes. Cyber terrorism, Credit cards frauds etc.

5  Unauthorized access therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Hackers write or use ready-made computer programs to attack to attack the target computer

6  Email spamming Email “spamming” refers to sending email to thousands and thousands of users-similar to a chain letter.  Sending malicious code through email.  Emails are used to send viruses etc. through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

7  Flooding a computer resource with more request than it can handle. This causes the resource to crash thereby denying access of service to unauthorized users: Example Attempts to flood a network, there by preventing legitimate network traffic.

8  Counterfeit currency notes, postage and revenue stamps, marks sheets etc can be forged using sophisticated computers, printers and scanners.

9  Drug traffickers are increasingly taking advantage of the Internet.  To sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.e-maildrug traffickersinternet cafes

10  Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks are the most likely. Others like police, medical, fire and rescue systems etc.  Cyber terrorism is an attractive option for modern terrorists for several reasons

11

12  The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national- level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia.Department of DefenseEstoniaGeorgia

13 Sailors analyze, detect and defensively respond to unauthorized activity within U.S. NavyU.S. Navy information systems and computer networks

14  http://en.wikipedia.org/wiki/Computer_crime http://en.wikipedia.org/wiki/Computer_crime  http://www.google.com.ph/search?q=Cyber+terrori sm&client=firefox-a&hs=P9j&rls=org.mozilla:en- US:official&source=lnms&tbm=isch&sa=X&ei=nzwTU qOlLea5iQfA8YCQBw&ved=0CAkQ_AUoAQ&biw=1 440&bih=797#facrc=_&imgdii=_&imgrc=w5kqyTCs wucaGM%3A%3Bja- Ne1lefcklQM%3Bhttp%253A%252F%252F2we26u4fa m7n16rz3a44uhbe1bq2.wpengine.netdna- cdn.com%252Fwp- content%252Fuploads%252F122112_1429_Cyberter ror1.jpg%3Bhttp%253A%252F%252Fresources.infos ecinstitute.com%252Fcyberterrorism-distinct-from- cybercrime%252F%3B846%3B761


Download ppt " It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either."

Similar presentations


Ads by Google