15
PRESENTED TO YOU BY:RENE VILORIA PERA COMPUTER CYBER CRIME LAW

PRESENTED TO YOU BY:RENE VILORIA PERA

  • Upload
    cahil

  • View
    43

  • Download
    0

Embed Size (px)

DESCRIPTION

COMPUTER CYBER CRIME LAW. PRESENTED TO YOU BY:RENE VILORIA PERA. CONTENTS. Introduction :. Types of Cyber Crime. CYBER CRIMES. Cyber crime is simply as criminal activity involving theinformation technology infrastructure. Illegal access -unauthorized access by unauthorized people. - PowerPoint PPT Presentation

Citation preview

Page 1: PRESENTED TO YOU BY:RENE VILORIA PERA

PRESENTED TO YOU BY:RENE VILORIA PERA

COMPUTER CYBER CRIME LAW

Page 2: PRESENTED TO YOU BY:RENE VILORIA PERA

CONTENTS

Introduction :

Types of Cyber Crime

Page 3: PRESENTED TO YOU BY:RENE VILORIA PERA

•CYBER CRIME IS SIMPLY AS CRIMINAL ACTIVITY INVOLVING THEINFORMATION TECHNOLOGY INFRASTRUCTURE.

•ILLEGAL ACCESS -UNAUTHORIZED ACCESS BY UNAUTHORIZED PEOPLE.

•ILLEGAL INTERCEPTION -TECHNICAL MEANS OF NON-PUBLICTRANSMISSIONS OF COMPUTER DATA TO, FROM OR WITHIN ACOMPUTER SYSTEM.

•DATA INTERFERENCE -ILLEGAL DAMAGING, DELETING OR ALTERATIONOF COMPUTER DATA.

•SYSTEMS INTERFERENCE -INTERFERING WITH THE FUNCTIONING OF A COMPUTER BY INPUTTING, TRANSMITTING OR SUPPRESSINGCOMPUTER DATA

CYBER CRIMES

Page 4: PRESENTED TO YOU BY:RENE VILORIA PERA

Types of Cyber Crime

HACKINGDENIAL OF SERVICE ATTACKVIRUS DESSIMINATIONSOFTWARE PIRACYPORNOGRAPHYIRC CrimeCREDIT CARD FRAUDNET EXTORTIONPHISHINGSPOOFINGCYBER STALKINGCYBER DEFAMATIONTHREATENINGSALAMI ATTACK

Page 5: PRESENTED TO YOU BY:RENE VILORIA PERA

HACKINGHacking in simple terms means illegal intrusioninto a computer system without the permission of the computer owner/user.

DENIAL OF SERVICE ATTACKThis is an act by the criminal, who floods the bandwidth of the victim¶s network or fills his e-mail box with spam mail depriving him of the services heis entitled to access or provide

Page 6: PRESENTED TO YOU BY:RENE VILORIA PERA

VIRUS DISSEMINATION Malicious software that attaches itself to other software.(virus, worms,TrojanHorse,Time bomb,Logic Bomb,Rabbit and Bacterium are the malicious softwares)

NET EXTORTION Copying the company¶s confidential data in order to extortsaid company for huge amount

Page 7: PRESENTED TO YOU BY:RENE VILORIA PERA

SPOOFING Getting one computer on a network to pretend to have theidentity of another computer, usually one with special access privileges , so as to obtain access to the other computers on thenetwork.

CYBER STALKINGThe Criminal follows the victim by sending emails, enteringthe chat rooms frequently.

Page 8: PRESENTED TO YOU BY:RENE VILORIA PERA

CYBER DEFAMATIONThe Criminal sends emails containing defamatory matters toall concerned of the victim or post the defamatory matters ona website. ( disgruntled employee may do thisAgainst boss,ex-boys friend against girl, Divorced husband againstwife etc)THREATENINGThe Criminal sends threatening email or comes in contact inchat rooms with or victim.Any one disgruntled may do this againstboss, friend or official)

Page 9: PRESENTED TO YOU BY:RENE VILORIA PERA

CATEGORIES OF CRIMES

Cyber Crimes

Mobiles Banking Internet

Page 10: PRESENTED TO YOU BY:RENE VILORIA PERA

CRIMES RELATED TO MOBILESChipping and pinning.

Usage of mobiles in cinema theatres to take videos.

Irritating an unknown person by continuous smsand phonecalls.

Taking photos without knowledge of that particular person.

Mobile robberies.

Blue bugging ±unknown persons interruption using bluetooth.

Page 11: PRESENTED TO YOU BY:RENE VILORIA PERA

CRIMES RELATED TO BANKING

 Nigerian money offers.Misusing others credit card in the public.Abusing pin numbers of credit cards.Issuing fake cheques.

Page 12: PRESENTED TO YOU BY:RENE VILORIA PERA

CRIMES RELATED TO INTERNETSale of duplications.Misusing the information stored on others personal computer or website.Software piracy.Forgeries such as ID theft.Harmful software -attaches itself to other software.

Page 13: PRESENTED TO YOU BY:RENE VILORIA PERA

Protect your Computers!

Use anti-virus software andfirewalls -keep them up to dateKeep your operating system upto date with critical securityupdates and patchesDon't open emails or attachments from unknownsourcesUse hard-to-guess passwords.Don¶t use words found in adictionary. Remember that password cracking tools existBack-up your computer data ondisks or CDs often

Page 14: PRESENTED TO YOU BY:RENE VILORIA PERA

CONCLUSION

CYBER CRIME IS A CRIME THAT RUINS PEOPLE FINANCIALLY, PERSONALLY, PROFESSIONALLYOFTEN TAKING YEARS TO RECOVER FROM IT UNLESSWE PEOPLE ARE AWARE OF IT.

Page 15: PRESENTED TO YOU BY:RENE VILORIA PERA