Types Of Computer Crime

Types of Computer Crime,[object Object],Zhuravlev Alexander  326 MSLU,[object Object]
COMPUTER-RELATED CRIME,[object Object],Computer crimes refer to the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. Even identity thefts, misusing devices or electronic frauds are considered to be computer crimes.,[object Object]
Background,[object Object],The increasing range of programmable electronic devices,,[object Object],from set-top TV boxes to mobile phones, means that,[object Object],‘computer’ crime can affect more than just personal,[object Object],computers (PCs). They and other electronic devices are,[object Object],particularly vulnerable to attack because they are flexible,,[object Object],can be reprogrammed, and are frequently networked with,[object Object],other devices. There are two main ways by which,[object Object],computers can be involved in crime:,[object Object]
Background,[object Object],[object Object],telephones. Another example is ‘phishing’,[object Object],•   New types of crime made possible by specific technologies. One example is denial of service attacks or DoS which prevent computer resources being available to intended users, for example by flooding web servers with more data than they can process.,[object Object],This was done in 2004 by a Russian crime gang in an extortion attempt on UK gambling websites during the 2004 Grand National. The National High Tech Crime Unit (NHTCU) acted with Russian authorities to arrest those responsible,[object Object]
Types of computer–related crime ,[object Object],Hacking: The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities.,[object Object],Kevin Mitnickwas a famous hacker for supposedly hacking into NORAD (the pentagon), though he claims he only looked at minor things such as Nokia and Motorola,[object Object],Vladimir Levin is famous because he allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. He was sentenced to three years in prison and ordered to pay Citibank $240,015 (his share from the heist). Citibank has since begun using the Dynamic Encryption Card, a security system so tight that no other financial institution in the world has it,[object Object]
Types of computer–related crime ,[object Object],Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there,[object Object],Attacks are increasing, with financial services accounting for over 93% of impersonated or hijacked brands through bogus websites and emails. Almost all of the UK’s high street banks have been affected by phishing.,[object Object]
Types of computer–related crime ,[object Object],                                                                            ,[object Object],                                                                            ,[object Object],                                                                      ,[object Object],Computer Viruses: These are actually computer programs that are capable of replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from one computer to another through the network, Internet or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law.,[object Object],Virus detections,[object Object],Love LetterThe fastest spreading virus in history appears to have been written by a resident of Manila in the Philippines. Sent via e-mail in May 2000 with "I LOVE YOU" in the subject field, it replicated itself to everyone in the user's Outlook address book and then destroyed local files. Love Letter forced numerous organizations to shut down their e-mail systems, as computer users were far too willing to let love into their lives.,[object Object],The list of viruses includes all detections,,[object Object], including worms, trojans, and tracking cookies.,[object Object]
Types of computer–related crime ,[object Object],Identity Theft: This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft.,[object Object],Albert Gonzalez of Miami, 28, is charged with acting with two unnamed conspirators to locate large corporations and steal vital account information in a crime that the Department of Justice calls "the single largest hacking and identity theft case ever prosecuted.",[object Object],Authorities say more than 130 million credit and debit card numbers were stolen in a corporate data breach involving three different corporations and two individuals,[object Object]
Types of computer–related crime ,[object Object],Cyberstalking: This is using the Internet to stalk a person just like someone world do in the real world. Here the stalker sends emails, spreads false information or issues threats using the Internet. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. ,[object Object],A 44 year old publishing executive named Claire Miller was harassed by strangers who were responding to verging-on-pornographic promises someone had made in her name online. These postings included her home address and telephone number. ,[object Object]
User awareness,[object Object],User awareness,[object Object],There is limited awareness of computer security among,[object Object],home as well as business users. Inadequately protected,[object Object],computers can be easy targets for unauthorised users.,[object Object],‘Get Safe Online’ is a joint Government-industry initiative,[object Object],to provide computer security advice.,[object Object],Get Safe Online,[object Object],The Government–industry partnership education initiative ‘Get Safe Online’ is the first national internet-based computer security awareness campaign for the general public and small businesses. The ‘Get Safe Online’ website has 13,000 websites which are linked to it. It provides,[object Object],information to individuals on how to protect themselves, their families or their business from online threats.,[object Object]
Thank You !,[object Object],Zhuravlev Alexander # 326 MSLU 2009,[object Object]
1 sur 11

Recommandé

CybercrimeCybercrime
CybercrimeKomal003
821 vues32 diapositives
Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.2K vues19 diapositives
Cyber crimeCyber crime
Cyber crimeMd. Atiqur Rahman
3K vues46 diapositives
Cyber crime pptCyber crime ppt
Cyber crime pptGracy Joseph
5.6K vues28 diapositives
Cyber CrimeCyber Crime
Cyber CrimeDarshan Vithani
5.1K vues15 diapositives
Cyber lawCyber law
Cyber lawUmang Maheshwari
26.8K vues20 diapositives

Contenu connexe

Tendances

Cyber  crimeCyber  crime
Cyber crimeSanket Gogoi
6.5K vues55 diapositives
Cyber  CrimeCyber  Crime
Cyber Crimemukeshkaran
10.2K vues29 diapositives
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
9.4K vues24 diapositives
Hacking Hacking
Hacking Farkhanda Kiran
1.3K vues29 diapositives
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
14.8K vues20 diapositives

Tendances(20)

Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi6.5K vues
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran10.2K vues
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
mahrukh rafique2.4K vues
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal9.4K vues
Hacking Hacking
Hacking
Farkhanda Kiran1.3K vues
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah14.8K vues
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule46.9K vues
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns2.4K vues
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji296.6K vues
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Niloy Biswas1K vues
cyber terrorismcyber terrorism
cyber terrorism
Accenture9.7K vues
cyber crimecyber crime
cyber crime
Mosuud jilani lipon13K vues
Cyber crime Cyber crime
Cyber crime
Jayant Raj2.8K vues
Computer CrimesComputer Crimes
Computer Crimes
Ivy Rose Recierdo6.2K vues
Cyber crimeCyber crime
Cyber crime
yazad dumasia1.7K vues
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert1.6K vues
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar4.3K vues
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala89.8K vues
CybercrimeCybercrime
Cybercrime
promit14K vues

Similaire à Types Of Computer Crime

Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
3.5K vues15 diapositives
InternetInternet
InternetJodip
2K vues16 diapositives
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptxThanmayiK22266716101
56 vues73 diapositives
English in writtenEnglish in written
English in writtenazhar manap
1.6K vues14 diapositives
Cyber crime Cyber crime
Cyber crime Soreingam Ragui
16.8K vues54 diapositives

Similaire à Types Of Computer Crime(20)

Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved3.5K vues
InternetInternet
Internet
Jodip2K vues
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
ThanmayiK2226671610156 vues
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar20K vues
English in writtenEnglish in written
English in written
azhar manap1.6K vues
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui16.8K vues
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
hichamelhirch2 vues
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
hichamelhirch3 vues
CYBER.pptxCYBER.pptx
CYBER.pptx
hichamelhirch5 vues
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
hichamelhirch4 vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur1.4K vues
Cyber crimeCyber crime
Cyber crime
Rahul Reddy632 vues
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut20 vues
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3) 3.7K vues
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam9 vues
Unit 1Unit 1
Unit 1
Jigarthacker5.7K vues
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb218 vues

Plus de Alexander Zhuravlev(8)

HessenHessen
Hessen
Alexander Zhuravlev1.3K vues
Intellectual property Intellectual property
Intellectual property
Alexander Zhuravlev648 vues
Social engineeringSocial engineering
Social engineering
Alexander Zhuravlev5.3K vues
Mistral  мистральMistral  мистраль
Mistral мистраль
Alexander Zhuravlev339 vues
The Medal Of HonorThe Medal Of Honor
The Medal Of Honor
Alexander Zhuravlev1.1K vues
US ConstitutionUS Constitution
US Constitution
Alexander Zhuravlev1.2K vues

Dernier(20)

ThroughputThroughput
Throughput
Moisés Armani Ramírez31 vues
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya59 vues
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation24 vues
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh36 vues

Types Of Computer Crime

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.