23
COMPUTER CRIMES TOP 5

Top 5 Computer Crime's

Embed Size (px)

DESCRIPTION

This Presentation is composed of the Top 5 Computer Crimes which we

Citation preview

Page 1: Top 5 Computer Crime's

COMPUTER CRIMES

TOP 5

Page 2: Top 5 Computer Crime's
Page 3: Top 5 Computer Crime's

5

Page 4: Top 5 Computer Crime's

Computer Fraud

• Happens when a victim is conned into believing that he will receive money or something else value.

• “being aware”

Page 5: Top 5 Computer Crime's

• Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.

Page 6: Top 5 Computer Crime's

• Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.

Page 7: Top 5 Computer Crime's
Page 8: Top 5 Computer Crime's

4

Page 9: Top 5 Computer Crime's

Computer Industrial

• is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.

Page 10: Top 5 Computer Crime's

• In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.

Page 11: Top 5 Computer Crime's
Page 12: Top 5 Computer Crime's

3

Page 13: Top 5 Computer Crime's

Computer Virus Transmitter

• Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data.

Page 14: Top 5 Computer Crime's

Malware

• A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.

• Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.

• Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.

Page 15: Top 5 Computer Crime's
Page 16: Top 5 Computer Crime's

2

Page 17: Top 5 Computer Crime's

Software Piracy

• Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.

Page 18: Top 5 Computer Crime's
Page 19: Top 5 Computer Crime's

1

Page 20: Top 5 Computer Crime's

Child Pornography

• (under Age 18) through he Internet is a crime.

• The Internet Has also been used as a tool for child prostitution.

• Pedophiles have used chat rooms to lure minors into illegal sexual encounters.

Page 21: Top 5 Computer Crime's
Page 22: Top 5 Computer Crime's

• “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim”

Page 23: Top 5 Computer Crime's

• Thank You