Presentation is loading. Please wait.

Presentation is loading. Please wait.

Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.

Similar presentations


Presentation on theme: "Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of."— Presentation transcript:

1 Whats it all about?

2  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the Internet.

3  Telecommunication crime is the criminal activity of taping into phone lines. Listening to phone calls for criminal intent.

4 Cyber crime  Drug trafficking  Sexual harassment  Fraud  Bullying  terrorism Telecommunication crime  Drug trafficking  Sexual harassment  Fraud  Bullying  terrorism

5

6

7  People committed to circumvention of computer security. This primarily concerns unauthorized remote computer break-ins via a communication networks such as the Internet

8  Gary McKinnon was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13- month period from February 2001 to March 2002, illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.  McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.

9  A new police Cyber Crime Unit is to be set up to protect Britain against the growing threat of attacks on the internet and in electronic communications.  Alongside the law enforcement unit, a new Joint Cyber Unit at the Government's GCHQ eavesdropping centre will develop the UK's military capabilities in cyberspace, Cabinet Office minister Francis Maude announced.  The teams form part of a £650 million Government drive to tackle what Mr Maude said was a "real and growing" threat to the UK's national interests from cyber attacks by organised criminals, terrorists, hostile states and "hacktivists".

10

11  The RCMP have set out a line of recommendations/ practices and examples of computer crime which the use to warn the public of possible crime to do with their personal or work computer.

12  Over a period of six months a person can acquire between $65,000 and $100,000 in fines & will be subsequently convicted of theft and will receive a prison sentence of three years.  This means anyone who breaks our criminal code are likely apprehended and convicted of there charges.

13

14  Cyber ethics is the philosophic study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society.  People feel that these are not crimes because police enforcement are not paying closely monitoring this; they cannot worry about a friend creating a mix cd for a friend or a phone scam someone accidentally bought into all the time.

15

16  Some common methods are:  Illegal downloads  Watching ppvs on free sites  Cyber bulling  Some more serious ones are:  Hacking  Child pornography  Virus intent programs  etc

17  We have to become more aware because if we don’t eventually someone or something will get the ability to hack our accounts and destroy important data or illegally use our online banking deposits  Great ways to save from this happening are  Use a personal account pass code that no one knows  Always delete credit card numbers from devices  Always upgrade security software


Download ppt "Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of."

Similar presentations


Ads by Google