SlideShare a Scribd company logo
1 of 31
Download to read offline
University of Mauritius
                             Faculty of Law & Management

                          LAWS 2100Y Foundations of IT Law




       Cybercrime & Computer
            Misuse cases
                     In Mauritius and African Regions
Presented by: Group 1
•Ashnee Gunness
•Bhavna Nobaub
•Ashveen Beechowa
•Ashesh Ramjeeawon
Agenda
What is Cybercrime?
Mauritian Cybercriminals
Cases of Computer Misuse in Mauritius
Cybercrimes in African Regions
Legislations in African Regions
Fighting off the Cybercrimals in Mauritius – the
Challenge
  Cyber crime Unit (Mtius)
  CERT-MU
                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
What is Cybercrime?
An attack that undermines the confidentiality, integrity
or availability of a computer, information resident on it,
or a computer service within a Network Information
System.
Some offences under Computer Misuse and
Cybercrime Act 2003:
Unauthorised access to data
Access with intent to commit offences
Unauthorised access to and interception of computer
service
Damaging or denying access to computer system

                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
Mauritian
Cybercriminals
   Cybercrime & Computer Misuse cases
      in Mauritius & African Regions
Do you Recognise the Face?




       Cybercrime & Computer Misuse cases
          in Mauritius & African Regions
CyberCriminal 1
     Vishal Ramessur – 32 years old
     First Mauritian Hacker involved in the
     ‘sabotage of internet connection’ in 2005
     Violation of section 7 (b) of Computer misuse and
     cybercrime Act de 2003 :
     “a denial of access to, or impairment of any program or
     data stored in, the computer system”
     Shall commit an offence and shall, on conviction be
     liable to a fine not exceeding 200, 000 and to penal
     service not exceeding 20 years
Source: http://www.lexpress.mu/display_search_result.php?news_id=38637
                             Cybercrime & Computer Misuse cases
                                in Mauritius & African Regions
Does this Name tell you anything?




       Booden (Vinay) Ramrichia



           Cybercrime & Computer Misuse cases
              in Mauritius & African Regions
CyberCriminal 2
 Booden (Vinay) Ramrichia -un pirate informatique du site
 de l’Etat
 un clerc du CISD de 28 ans
 poursuivi en cour intermédiaire
 20 mai 2005 - tentatives pour bloquer l’accès à deux des
 principaux serveurs du système
 Dans sa déposition à la police, il avoue
 Mais la magistrate Adila Hamuth écrit : “Il a été clairement
 convenu, la fois dernière, que le procès devait être déjà logé.
 Cette affaire a traîné et la poursuite n’a pu expliquer pourquoi
 l’affaire n’a pas été instruite. Dans les circonstances, la charge
 provisoire est rayée
Source: http://www.lexpress.mu/display_search_result.php?news_id=90200
                        Cybercrime & Computer Misuse cases
                           in Mauritius & African Regions
Do you Recognise this Cybercrime?




          Cybercrime & Computer Misuse cases
             in Mauritius & African Regions
Computer Misuse -Phishing in M’tius

   26 septembre 2004, Kovalen, 14 ans, étudiant du
   collège St Esprit, atteint d’une maladie incurable – la
   maladie de Creutz-feldt-Jakob.
   l’adolescent peut être sauvé, mais comme il vient d’une
   famille modeste, il n’a pas les moyens de se faire soigner
   ! Ils lancent un appel à la générosité : « Donnez Rs 1, Rs
   5 ou même Rs 100. Aidez cet enfant à vivre plus
   longtemps, chacun a le droit de vivre, pourquoi pas lui ?
   Plusieurs associations dont la Croix Rouge, Amnesty
   International participent à cet élan de solidarité. »
  Source:http://www.lexpress.mu/display_search_result.php?news_id=52226
                           Cybercrime & Computer Misuse cases
                              in Mauritius & African Regions
Cybercrime & Computer Misuse cases
   in Mauritius & African Regions
Important Security Announcement To Internet
Banking(IB) Customers Port-Louis, 21st January 2008




                Cybercrime & Computer Misuse cases
                   in Mauritius & African Regions
Computer Misuse
May 2008- Three Cases lodged by the Mauritius
Telecom
foreigners have introduced a system with the
help of switches and other apparatus to divert
international calls coming from abroad.
Diverting the gateway of MT is a criminal
offence.
This has led to the loss of huge amount of
money for MT.
              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
Computer Misuse (ctnued..)
The Information Communication Technologies Act 2001:-
under section 46 offences
(j) By means of an apparatus or device connected to an
installation maintained or operated by a licensee-
(i) defrauds the licensee of any fee or charge properly payable for
the use of a service; causes the licensee to provide a service to
some other person without payment by such other person of the
appropriate fee or charge; or fraudulently installs or causes to be
installed an access to a telecommunication line;
Penalties
(1) Any person who commits an offence under this Act shall, on
conviction, be liable to a fine not exceeding 1,000,000 rupees and
to imprisonment for a term not exceeding 5 years

                    Cybercrime & Computer Misuse cases
                       in Mauritius & African Regions
Cybercrimes in African Regions
Legislations in African Regions




      Cybercrime & Computer Misuse cases
         in Mauritius & African Regions
African Regions
1. Nigeria




               Cybercrime & Computer Misuse cases
                  in Mauritius & African Regions
Cybercrime – Nigerian 419
Nigerian 419 scam stole the most money off Internet.
Americans reported losing an all-time high of $183
million to Internet fraud in 2005, up 169 percent from
$68 million in 2004.

Refered to as quot;Advance Fee Fraudquot; or quot;419 Fraudquot;

The Scam operates as follows: the target receives an
unsolicited fax, email, or letter often concerning Nigeria
or another African nation containing either a money
laundering or other illegal proposal

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Cybercrime & Computer Misuse cases
   in Mauritius & African Regions
African Regions
2. South Africa




              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
Cybercrimes -South Africa
Credit card quot;cloningquot; and e-mail scams
Windows Sinowal Trojan -500 000 online bank
accounts and affected several thousands credit
cards in Nigeria, South Africa




              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
African Regions
3. Ghana




             Cybercrime & Computer Misuse cases
                in Mauritius & African Regions
Cybercrime - Ghana
Many Ghanaians perpetrate credit card fraud.
The most typical example is a group in Nima, called
'Sakawa'. This group is alleged to be selling stolen credit
cards numbers as well as using same to order for
products from the United States and Europe.

These scammers buy or steal credit card and
verification numbers from hotel employees and cashiers
of super markets, either in the country or from abroad.

                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
Legislations in African regions
Electronic Communications and Transactions Act (ECT).
Hacking been entrenched in our law in s86 (1) of the ECT,
which makes any unlawful access and interception of data a
criminal offence.
The ECT has now created “Cyber-Inspectors” who, with the
authority of a warrant, may enter any premises or access
information that has a bearing on an investigation (into possible
cyber crime)
Cyber Inspectors are empowered to access and inspect the
operation of any computer or equipment forming part of an
information system- used or suspected to have been used in an
offence- and require any person in control of, or otherwise
involved with the operation of a computer to provide reasonable
technical assistance.

                    Cybercrime & Computer Misuse cases
                       in Mauritius & African Regions
Fighting off the cybercrimals in
   Mauritius – the Challenge




         Cybercrime & Computer Misuse cases
            in Mauritius & African Regions
Cyber Crime Unit(M’tius)
Created in 2000
Takes into consideration:
  Data Protection Act 2000
  Information and Communication Technology Act 2001
  Computer Misuse and Cyber Crime Act 2003
Pour apprendre à collecter des preuves plus
correctement, la force policière a envoyé 21 policiers
suivre une formation. Celle-ci était dispensée par le
département Anti-Terrorism Assistance (ATA)
Le cours était dispensé par quatre experts américains de
l’ATA.

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Les agents de l’ordre locaux ont ainsi appris comment
pénétrer sur les lieux d’un crime.

Par exemple, lorsque la police débarque chez un
individu soupçonné de fabriquer des faux billets de
banque, la première chose à examiner sera le clavier de
l’ordinateur. Et avant que cet ordinateur ne soit
débranché, les enquêteurs tenteront de collecter le
maximum d’informations sur le disque dur. Ensuite,
chaque pièce, composant de l’ordinateur, sera
soigneusement rangée dans un sac statique (sac
spécifique pour protéger les appareils informatiques) et
les articles saisis conservés dans une salle climatisée.
                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Les deux sections directement liées, concernées par le
cybercrime sont l’Information Technology (IT) de la
police – placée sous la responsabilité du sergent
Balgobin – et la Cybercrime Unit sous le
commandement du sergent Tany.
Parmi les 21 participants à cette formation en
cybercrime, on note la présence de policiers de
l’Information Technology, du Central Criminal
Investigation Department, de la Criminal Investigation
Division, de la Major Crimes Investigation Team et de
la Police Training School.

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
CERT-MU
Mauritian Computer Emergency Response Team
 (CERT-MU)
 Fully Operational since 16 May 2008
 Incident reporting, Security alerts, Awareness
 Programmes
  Mission: To enhance the security of Mauritius
  information and communications infrastructure
  through effective collaboration and communication
  with all stakeholders
                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
CERT-MU
URL: http://cert-mu.org.mu
Email: info@cert-mu.gov.mu
Toll Free: 800 2378 ( 8.45 am to 4.00 pm)




                       Cybercrime & Computer Misuse cases
                          in Mauritius & African Regions
References
NCB website
Cyber crime unit
Lexpress
Defimedia.info
UoM Library Law Section




             Cybercrime & Computer Misuse cases
                in Mauritius & African Regions
Thank You for your kind attention!




        Cybercrime & Computer Misuse cases
           in Mauritius & African Regions

More Related Content

What's hot

History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
CAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTCAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTGaytri Vyas
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTCAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICT
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 

Viewers also liked

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Cybercrime And Computer Misuse Cases

CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethicSyed Ali Hassan
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsJacqueline Fick
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 

Similar to Cybercrime And Computer Misuse Cases (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 

More from Ashesh R

Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launchAshesh R
 
Open source
Open sourceOpen source
Open sourceAshesh R
 
Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusinessAshesh R
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on GiftsAshesh R
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyoneAshesh R
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 MexaAshesh R
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour TousAshesh R
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
Activity Diagram
Activity DiagramActivity Diagram
Activity DiagramAshesh R
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramAshesh R
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case ToolsAshesh R
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1Ashesh R
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving TechniquesAshesh R
 
National Geographic
National GeographicNational Geographic
National GeographicAshesh R
 
E Recruitment
E RecruitmentE Recruitment
E RecruitmentAshesh R
 
Reflections
ReflectionsReflections
ReflectionsAshesh R
 

More from Ashesh R (18)

Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launch
 
Open source
Open sourceOpen source
Open source
 
Web2.0
Web2.0Web2.0
Web2.0
 
Linux
LinuxLinux
Linux
 
Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusiness
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on Gifts
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyone
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 Mexa
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour Tous
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
Activity Diagram
Activity DiagramActivity Diagram
Activity Diagram
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case Tools
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving Techniques
 
National Geographic
National GeographicNational Geographic
National Geographic
 
E Recruitment
E RecruitmentE Recruitment
E Recruitment
 
Reflections
ReflectionsReflections
Reflections
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Cybercrime And Computer Misuse Cases

  • 1. University of Mauritius Faculty of Law & Management LAWS 2100Y Foundations of IT Law Cybercrime & Computer Misuse cases In Mauritius and African Regions Presented by: Group 1 •Ashnee Gunness •Bhavna Nobaub •Ashveen Beechowa •Ashesh Ramjeeawon
  • 2. Agenda What is Cybercrime? Mauritian Cybercriminals Cases of Computer Misuse in Mauritius Cybercrimes in African Regions Legislations in African Regions Fighting off the Cybercrimals in Mauritius – the Challenge Cyber crime Unit (Mtius) CERT-MU Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 3. What is Cybercrime? An attack that undermines the confidentiality, integrity or availability of a computer, information resident on it, or a computer service within a Network Information System. Some offences under Computer Misuse and Cybercrime Act 2003: Unauthorised access to data Access with intent to commit offences Unauthorised access to and interception of computer service Damaging or denying access to computer system Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 4. Mauritian Cybercriminals Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 5. Do you Recognise the Face? Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 6. CyberCriminal 1 Vishal Ramessur – 32 years old First Mauritian Hacker involved in the ‘sabotage of internet connection’ in 2005 Violation of section 7 (b) of Computer misuse and cybercrime Act de 2003 : “a denial of access to, or impairment of any program or data stored in, the computer system” Shall commit an offence and shall, on conviction be liable to a fine not exceeding 200, 000 and to penal service not exceeding 20 years Source: http://www.lexpress.mu/display_search_result.php?news_id=38637 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 7. Does this Name tell you anything? Booden (Vinay) Ramrichia Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 8. CyberCriminal 2 Booden (Vinay) Ramrichia -un pirate informatique du site de l’Etat un clerc du CISD de 28 ans poursuivi en cour intermédiaire 20 mai 2005 - tentatives pour bloquer l’accès à deux des principaux serveurs du système Dans sa déposition à la police, il avoue Mais la magistrate Adila Hamuth écrit : “Il a été clairement convenu, la fois dernière, que le procès devait être déjà logé. Cette affaire a traîné et la poursuite n’a pu expliquer pourquoi l’affaire n’a pas été instruite. Dans les circonstances, la charge provisoire est rayée Source: http://www.lexpress.mu/display_search_result.php?news_id=90200 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 9. Do you Recognise this Cybercrime? Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 10. Computer Misuse -Phishing in M’tius 26 septembre 2004, Kovalen, 14 ans, étudiant du collège St Esprit, atteint d’une maladie incurable – la maladie de Creutz-feldt-Jakob. l’adolescent peut être sauvé, mais comme il vient d’une famille modeste, il n’a pas les moyens de se faire soigner ! Ils lancent un appel à la générosité : « Donnez Rs 1, Rs 5 ou même Rs 100. Aidez cet enfant à vivre plus longtemps, chacun a le droit de vivre, pourquoi pas lui ? Plusieurs associations dont la Croix Rouge, Amnesty International participent à cet élan de solidarité. » Source:http://www.lexpress.mu/display_search_result.php?news_id=52226 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 11. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 12. Important Security Announcement To Internet Banking(IB) Customers Port-Louis, 21st January 2008 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 13. Computer Misuse May 2008- Three Cases lodged by the Mauritius Telecom foreigners have introduced a system with the help of switches and other apparatus to divert international calls coming from abroad. Diverting the gateway of MT is a criminal offence. This has led to the loss of huge amount of money for MT. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 14. Computer Misuse (ctnued..) The Information Communication Technologies Act 2001:- under section 46 offences (j) By means of an apparatus or device connected to an installation maintained or operated by a licensee- (i) defrauds the licensee of any fee or charge properly payable for the use of a service; causes the licensee to provide a service to some other person without payment by such other person of the appropriate fee or charge; or fraudulently installs or causes to be installed an access to a telecommunication line; Penalties (1) Any person who commits an offence under this Act shall, on conviction, be liable to a fine not exceeding 1,000,000 rupees and to imprisonment for a term not exceeding 5 years Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 15. Cybercrimes in African Regions Legislations in African Regions Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 16. African Regions 1. Nigeria Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 17. Cybercrime – Nigerian 419 Nigerian 419 scam stole the most money off Internet. Americans reported losing an all-time high of $183 million to Internet fraud in 2005, up 169 percent from $68 million in 2004. Refered to as quot;Advance Fee Fraudquot; or quot;419 Fraudquot; The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nation containing either a money laundering or other illegal proposal Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 18. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 19. African Regions 2. South Africa Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 20. Cybercrimes -South Africa Credit card quot;cloningquot; and e-mail scams Windows Sinowal Trojan -500 000 online bank accounts and affected several thousands credit cards in Nigeria, South Africa Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 21. African Regions 3. Ghana Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 22. Cybercrime - Ghana Many Ghanaians perpetrate credit card fraud. The most typical example is a group in Nima, called 'Sakawa'. This group is alleged to be selling stolen credit cards numbers as well as using same to order for products from the United States and Europe. These scammers buy or steal credit card and verification numbers from hotel employees and cashiers of super markets, either in the country or from abroad. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 23. Legislations in African regions Electronic Communications and Transactions Act (ECT). Hacking been entrenched in our law in s86 (1) of the ECT, which makes any unlawful access and interception of data a criminal offence. The ECT has now created “Cyber-Inspectors” who, with the authority of a warrant, may enter any premises or access information that has a bearing on an investigation (into possible cyber crime) Cyber Inspectors are empowered to access and inspect the operation of any computer or equipment forming part of an information system- used or suspected to have been used in an offence- and require any person in control of, or otherwise involved with the operation of a computer to provide reasonable technical assistance. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 24. Fighting off the cybercrimals in Mauritius – the Challenge Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 25. Cyber Crime Unit(M’tius) Created in 2000 Takes into consideration: Data Protection Act 2000 Information and Communication Technology Act 2001 Computer Misuse and Cyber Crime Act 2003 Pour apprendre à collecter des preuves plus correctement, la force policière a envoyé 21 policiers suivre une formation. Celle-ci était dispensée par le département Anti-Terrorism Assistance (ATA) Le cours était dispensé par quatre experts américains de l’ATA. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 26. Les agents de l’ordre locaux ont ainsi appris comment pénétrer sur les lieux d’un crime. Par exemple, lorsque la police débarque chez un individu soupçonné de fabriquer des faux billets de banque, la première chose à examiner sera le clavier de l’ordinateur. Et avant que cet ordinateur ne soit débranché, les enquêteurs tenteront de collecter le maximum d’informations sur le disque dur. Ensuite, chaque pièce, composant de l’ordinateur, sera soigneusement rangée dans un sac statique (sac spécifique pour protéger les appareils informatiques) et les articles saisis conservés dans une salle climatisée. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 27. Les deux sections directement liées, concernées par le cybercrime sont l’Information Technology (IT) de la police – placée sous la responsabilité du sergent Balgobin – et la Cybercrime Unit sous le commandement du sergent Tany. Parmi les 21 participants à cette formation en cybercrime, on note la présence de policiers de l’Information Technology, du Central Criminal Investigation Department, de la Criminal Investigation Division, de la Major Crimes Investigation Team et de la Police Training School. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 28. CERT-MU Mauritian Computer Emergency Response Team (CERT-MU) Fully Operational since 16 May 2008 Incident reporting, Security alerts, Awareness Programmes Mission: To enhance the security of Mauritius information and communications infrastructure through effective collaboration and communication with all stakeholders Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 29. CERT-MU URL: http://cert-mu.org.mu Email: info@cert-mu.gov.mu Toll Free: 800 2378 ( 8.45 am to 4.00 pm) Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 30. References NCB website Cyber crime unit Lexpress Defimedia.info UoM Library Law Section Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 31. Thank You for your kind attention! Cybercrime & Computer Misuse cases in Mauritius & African Regions