Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.

Similar presentations


Presentation on theme: "By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime."— Presentation transcript:

1 By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime

2 Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.Internetcomputers Type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. hackingcopyright infringementchild pornographychild grooming There are two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. What are some of the crimes that cybercriminals do?

3 Example Of Crimes Examples of crimes that primarily target computer networks or devices would include: Examples of crimes that merely use computer networks or devices would include: Malware-is software designed to infiltrate a computer system without the owner's informed consent. Malwaresoftwareinformed consent Denial-of-service attack -is an attempt to make a computer resource unavailable to its intended users. Computer viruses - is a computer program that can copy itself and infect a computer. Computer viruses computer program Cyber stalking- is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyber stalking Internet stalk Fraud and identity theft-is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Fraudidentity theft fraud Information warfare -is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare Phishing scams -Is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details. Phishing scams passwords

4 FBI and Cyber Crime Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online sexual predators who use the Internet to meet and exploit children To counteract operations that target US intellectual property, endangering or national security and competitiveness To dismantle national and transnational organized criminal enterprises engaging in Internet fraud FBI’s cyber mission:

5 What is the FBI doing? Pose undercover as teenage girls in online chat rooms to try to catch internet predators. Trying to help internet scam victims and find who scammed them. Breaking passwords and decrypting files to find out what suspected hackers are doing

6 The US Immigration & Customs Enforcement Agency What are they involved in? Possession, manufacture and distribution of images of child abuse International money laundering and illegal cyber-banking Illegal arms trafficking and illegal export of strategic/controlled commodities Drug trafficking General smuggling (animals, stolen art etc) Intellectual property rights violations (sharing music) Immigration violations and identity and benefit fraud

7 Video


Download ppt "By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime."

Similar presentations


Ads by Google