Upload
cahil
View
43
Download
0
Tags:
Embed Size (px)
DESCRIPTION
COMPUTER CYBER CRIME LAW. PRESENTED TO YOU BY:RENE VILORIA PERA. CONTENTS. Introduction :. Types of Cyber Crime. CYBER CRIMES. Cyber crime is simply as criminal activity involving theinformation technology infrastructure. Illegal access -unauthorized access by unauthorized people. - PowerPoint PPT Presentation
Citation preview
PRESENTED TO YOU BY:RENE VILORIA PERA
COMPUTER CYBER CRIME LAW
CONTENTS
Introduction :
Types of Cyber Crime
•CYBER CRIME IS SIMPLY AS CRIMINAL ACTIVITY INVOLVING THEINFORMATION TECHNOLOGY INFRASTRUCTURE.
•ILLEGAL ACCESS -UNAUTHORIZED ACCESS BY UNAUTHORIZED PEOPLE.
•ILLEGAL INTERCEPTION -TECHNICAL MEANS OF NON-PUBLICTRANSMISSIONS OF COMPUTER DATA TO, FROM OR WITHIN ACOMPUTER SYSTEM.
•DATA INTERFERENCE -ILLEGAL DAMAGING, DELETING OR ALTERATIONOF COMPUTER DATA.
•SYSTEMS INTERFERENCE -INTERFERING WITH THE FUNCTIONING OF A COMPUTER BY INPUTTING, TRANSMITTING OR SUPPRESSINGCOMPUTER DATA
CYBER CRIMES
Types of Cyber Crime
HACKINGDENIAL OF SERVICE ATTACKVIRUS DESSIMINATIONSOFTWARE PIRACYPORNOGRAPHYIRC CrimeCREDIT CARD FRAUDNET EXTORTIONPHISHINGSPOOFINGCYBER STALKINGCYBER DEFAMATIONTHREATENINGSALAMI ATTACK
HACKINGHacking in simple terms means illegal intrusioninto a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACKThis is an act by the criminal, who floods the bandwidth of the victim¶s network or fills his e-mail box with spam mail depriving him of the services heis entitled to access or provide
VIRUS DISSEMINATION Malicious software that attaches itself to other software.(virus, worms,TrojanHorse,Time bomb,Logic Bomb,Rabbit and Bacterium are the malicious softwares)
NET EXTORTION Copying the company¶s confidential data in order to extortsaid company for huge amount
SPOOFING Getting one computer on a network to pretend to have theidentity of another computer, usually one with special access privileges , so as to obtain access to the other computers on thenetwork.
CYBER STALKINGThe Criminal follows the victim by sending emails, enteringthe chat rooms frequently.
CYBER DEFAMATIONThe Criminal sends emails containing defamatory matters toall concerned of the victim or post the defamatory matters ona website. ( disgruntled employee may do thisAgainst boss,ex-boys friend against girl, Divorced husband againstwife etc)THREATENINGThe Criminal sends threatening email or comes in contact inchat rooms with or victim.Any one disgruntled may do this againstboss, friend or official)
CATEGORIES OF CRIMES
Cyber Crimes
Mobiles Banking Internet
CRIMES RELATED TO MOBILESChipping and pinning.
Usage of mobiles in cinema theatres to take videos.
Irritating an unknown person by continuous smsand phonecalls.
Taking photos without knowledge of that particular person.
Mobile robberies.
Blue bugging ±unknown persons interruption using bluetooth.
CRIMES RELATED TO BANKING
Nigerian money offers.Misusing others credit card in the public.Abusing pin numbers of credit cards.Issuing fake cheques.
CRIMES RELATED TO INTERNETSale of duplications.Misusing the information stored on others personal computer or website.Software piracy.Forgeries such as ID theft.Harmful software -attaches itself to other software.
Protect your Computers!
Use anti-virus software andfirewalls -keep them up to dateKeep your operating system upto date with critical securityupdates and patchesDon't open emails or attachments from unknownsourcesUse hard-to-guess passwords.Don¶t use words found in adictionary. Remember that password cracking tools existBack-up your computer data ondisks or CDs often
CONCLUSION
CYBER CRIME IS A CRIME THAT RUINS PEOPLE FINANCIALLY, PERSONALLY, PROFESSIONALLYOFTEN TAKING YEARS TO RECOVER FROM IT UNLESSWE PEOPLE ARE AWARE OF IT.