2. Contents
No. Topic
1. Introduction
2. History of cyber crime
3. Definition
4. Categories of cyber crime
5. Types of cyber crime
6. Cyber criminals
7. Prevention
8. Conclusion
9. Reference
3. Introduction
The internet in Malaysia is growing rapidly. It has
given rise to new opportunities in every field such
as entertainment, business, sports and
education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime.
4. History of cybercrime
The first recorded cyber crime took place in the
year 1820
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom.
This device allowed the repetition of a series of
steps in the weaving of special fabrics.
5. This resulted in a fear amongst Jacquard's
employees that their traditional employment and
livelihood were being threatened.
They committed acts of sabotage to discourage
Jacquard from further use of the new technology.
This is the first recorded cyber crime!
6. Definition
Offences that are committed by using modern
telecommunication networks such as Internet
and mobile phone as a subject to steal a
person’s identity or illegal imports or malicious
programs
7. Categories of Cyber Crime
The Computer as a Target :
>using a computer to attack other computers.
The computer as a weapon :
>using a computer to commit real
world crimes.
8. 20%
25%
27%
71%
79%
85%
11%
17%
Types of Cyber Crime
Theft of proprietary
information
System penetration
from outside
Denial service
Unauthorized access
of insiders
Employee abuse of
internet privilage
Viruses
Financial Fraud
Sabotage of
data/networks
9.
10. Cyber Criminals
Kids (age group 9-16 etc.)
Organized hacktivists
Disgruntled employees
Professional hackers (corporate espionage)
11. Safety tips for Cyber Crime
Use antivirus software’s
Insert firewalls
Uninstall unnecessary software
Maintain backup
Check security settings
Never give your identity to strangers
12. Conclusion
Within the law enforcement agencies, a
set of rules must be developed
to address the various categories of
computer crime.
As such, investigators will know what
and which materials to search the
electronic evidence to recover, and the
chain of custody to maintain .