150 likes | 311 Views
COMPUTER CYBER CRIME LAW. PRESENTED TO YOU BY:RENE VILORIA PERA. CONTENTS. Introduction :. Types of Cyber Crime. CYBER CRIMES. Cyber crime is simply as criminal activity involving theinformation technology infrastructure. Illegal access -unauthorized access by unauthorized people.
E N D
COMPUTER CYBER CRIME LAW PRESENTED TO YOU BY:RENE VILORIA PERA
CONTENTS Introduction : • Types of Cyber Crime
CYBER CRIMES • Cyber crime is simply as criminal activity involving theinformation technology infrastructure. • Illegal access -unauthorized access by unauthorized people. • Illegal interception -technical means of non-publictransmissions of computer data to, from or within acomputer system. • Data interference -illegal damaging, deleting or alterationof computer data. • systems interference -interfering with the functioning of a computer by inputting, transmitting or suppressingcomputer data
Types of Cyber Crime • HACKING • DENIAL OF SERVICE ATTACK • VIRUS DESSIMINATION • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER STALKING • CYBER DEFAMATION • THREATENING • SALAMI ATTACK
HACKING Hacking in simple terms means illegal intrusioninto a computer system without the permission of the computer owner/user. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim¶s network or fills his e-mail box with spam mail depriving him of the services heis entitled to access or provide
VIRUS DISSEMINATION Malicious software that attaches itself to other software.(virus, worms,TrojanHorse, Time bomb, Logic Bomb,Rabbit and Bacterium are the malicious softwares) NET EXTORTION Copying the company¶s confidential data in order to extortsaid company for huge amount
SPOOFING Getting one computer on a network to pretend to have theidentity of another computer, usually one with special access privileges , so as to obtain access to the other computers on thenetwork. CYBER STALKING The Criminal follows the victim by sending emails, enteringthe chat rooms frequently.
CYBER DEFAMATION The Criminal sends emails containing defamatory matters toall concerned of the victim or post the defamatory matters ona website. ( disgruntled employee may do this Against boss,ex-boys friend against girl, Divorced husband againstwife etc) THREATENING The Criminal sends threatening email or comes in contact inchat rooms with or victim. Any one disgruntled may do this againstboss, friend or official)
CATEGORIES OF CRIMES Cyber Crimes Internet Banking Mobiles
CRIMES RELATED TO MOBILES • Chipping and pinning. • Usage of mobiles in cinema theatres to take videos. • Irritating an unknown person by continuous smsandphonecalls. • Taking photos without knowledge of that particular person. • Mobile robberies. • Blue bugging ±unknown persons interruption using bluetooth.
CRIMES RELATED TO BANKING • Nigerian money offers. • Misusing others credit card in the public. • Abusing pin numbers of credit cards. • Issuing fake cheques.
CRIMES RELATED TO INTERNET • Sale of duplications. • Misusing the information stored on others personal computer or website. • Software piracy. • Forgeries such as ID theft. • Harmful software -attaches itself to other software.
Protect your Computers! • Use anti-virus software andfirewalls -keep them up to date • Keep your operating system upto date with critical securityupdates and patches • Don't open emails or attachments from unknownsources • Use hard-to-guess passwords.Don¶t use words found in adictionary. Remember that password cracking tools exist • Back-up your computer data ondisks or CDs often
CONCLUSION Cyber crime is a crime that ruins people financially, personally, professionallyoften taking years to recover from it unlesswe people are aware of it.