1 / 15

PRESENTED TO YOU BY:RENE VILORIA PERA

COMPUTER CYBER CRIME LAW. PRESENTED TO YOU BY:RENE VILORIA PERA. CONTENTS. Introduction :. Types of Cyber Crime. CYBER CRIMES. Cyber crime is simply as criminal activity involving theinformation technology infrastructure. Illegal access -unauthorized access by unauthorized people.

cahil
Download Presentation

PRESENTED TO YOU BY:RENE VILORIA PERA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER CYBER CRIME LAW PRESENTED TO YOU BY:RENE VILORIA PERA

  2. CONTENTS Introduction : • Types of Cyber Crime

  3. CYBER CRIMES • Cyber crime is simply as criminal activity involving theinformation technology infrastructure. • Illegal access -unauthorized access by unauthorized people. • Illegal interception -technical means of non-publictransmissions of computer data to, from or within acomputer system. • Data interference -illegal damaging, deleting or alterationof computer data. • systems interference -interfering with the functioning of a computer by inputting, transmitting or suppressingcomputer data

  4. Types of Cyber Crime • HACKING • DENIAL OF SERVICE ATTACK • VIRUS DESSIMINATION • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER STALKING • CYBER DEFAMATION • THREATENING • SALAMI ATTACK

  5. HACKING Hacking in simple terms means illegal intrusioninto a computer system without the permission of the computer owner/user. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim¶s network or fills his e-mail box with spam mail depriving him of the services heis entitled to access or provide

  6. VIRUS DISSEMINATION Malicious software that attaches itself to other software.(virus, worms,TrojanHorse, Time bomb, Logic Bomb,Rabbit and Bacterium are the malicious softwares) NET EXTORTION Copying the company¶s confidential data in order to extortsaid company for huge amount

  7. SPOOFING Getting one computer on a network to pretend to have theidentity of another computer, usually one with special access privileges , so as to obtain access to the other computers on thenetwork. CYBER STALKING The Criminal follows the victim by sending emails, enteringthe chat rooms frequently.

  8. CYBER DEFAMATION The Criminal sends emails containing defamatory matters toall concerned of the victim or post the defamatory matters ona website. ( disgruntled employee may do this Against boss,ex-boys friend against girl, Divorced husband againstwife etc) THREATENING The Criminal sends threatening email or comes in contact inchat rooms with or victim. Any one disgruntled may do this againstboss, friend or official)

  9. CATEGORIES OF CRIMES Cyber Crimes Internet Banking Mobiles

  10. CRIMES RELATED TO MOBILES • Chipping and pinning. • Usage of mobiles in cinema theatres to take videos. • Irritating an unknown person by continuous smsandphonecalls. • Taking photos without knowledge of that particular person. • Mobile robberies. • Blue bugging ±unknown persons interruption using bluetooth.

  11. CRIMES RELATED TO BANKING •  Nigerian money offers. • Misusing others credit card in the public. • Abusing pin numbers of credit cards. • Issuing fake cheques.

  12. CRIMES RELATED TO INTERNET • Sale of duplications. • Misusing the information stored on others personal computer or website. • Software piracy. • Forgeries such as ID theft. • Harmful software -attaches itself to other software.

  13. Protect your Computers! • Use anti-virus software andfirewalls -keep them up to date • Keep your operating system upto date with critical securityupdates and patches • Don't open emails or attachments from unknownsources • Use hard-to-guess passwords.Don¶t use words found in adictionary. Remember that password cracking tools exist • Back-up your computer data ondisks or CDs often

  14. CONCLUSION Cyber crime is a crime that ruins people financially, personally, professionallyoften taking years to recover from it unlesswe people are aware of it.

More Related