SlideShare une entreprise Scribd logo
1  sur  10
Research Assignment
Communication Technologies & Change
Sarah Johnson – u3025130
Tutorial Group #4
Cybercrime is defined as:
‘computer-mediated activities which are either
illegal or considered illicit by certain parties and
which can be conducted through global electronic
networks’
(Yar, 2006, p9)
 Cracking – accessing computer systems without
authority to commit a crime. Includes deliberately corrupting or
erasing information within computer systems, defacing websites, and
running copy-protected programs without a password or valid license
string
 Piracy – copying protected software without
authorisation
 Phreaking – manipulating a phone system using a
computer or other device to obtain free telephone calls
or charge calls to another account
 Cyberstalking – using a computer to harass and
terrorise selected human and institutional targets,
causing them to fear injury or harm
 Cyberpornography – producing and/or
distributing pornography using a computer
 Cyberterrorism – unlawful attacks and threats of
attack by terrorists against computers, networks, and
the information stored therein to intimidate or coerce a
government or its people to further the perpetrator’s
political or social objectives
 Hacker unions or crews (domestic and foreign)
 Organised crime
 Foreign Intelligence Services
 Botnet operators
 Random individuals looking to take advantage
of readily available black (underground)
technologies
(Fujitsu, 2009, p4)
 In 2008, security vendor AVG conducted a survey into global
cybercrime and found that Australia has the highest incidence of
cyber crime in the world with more than 39 per cent of
Australian’s having been the victim of cyber crime
(Fujitsu, 2009, p3)
 The 2005 AusCERT Australian Computer Crime and Security Survey
found that in total, $16.9million was lost by 110 of the Australian
organisations surveyed (Arias, 2007)
 A recent report by the Australian Institute of Criminology found
that cybercrime is costing Australian businesses more than $600
million annually (Edwards, 2009)
The Commonwealth Cybercrime Bill 2001
– covers the following offences:
 Unauthorised access, modification or impairment to commit a
serious offence
 Unauthorised modification of data to cause impairment
 Unauthorised impairment of electronic communications
 Possession of data with intent to commit computer offence
(described as "akin to the more familiar offences of 'going
equipped for stealing' or possession of an offensive weapon")
 Supply of data with intent to commit a computer offence
 Unauthorised access to restricted data
 Unauthorised impairment of data held in a computer disk, credit
card, etc.
(Electronic Frontiers Australia, Inc., 2008)
The Model Criminal Code –
Chapter 4: Damage and Computing Offences
 State & territory regulation of cybercrime
 Contains a range of offences concerned with unauthorised access,
modification and impairment of data
 Further divided into Serious Computer Offences (Division
477) or Other Computer Offences (Division 478)
(Clough, 2010, p44)
For an in-depth exploration of
Cybercrime and the implications it is
having on Australian Society, read
the “Cybercrime” research paper by
Sarah Johnson.
 Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet
Business Law Services, Inc. Available from URL:
http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews
[Accessed 13/11/2010]
 Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.
 Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG
Communications. Available from URL:
http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_
report/ [Accessed 13/11/2010]
 Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia:
EFA, Inc. Available from URL:
http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]
 Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New
Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download
from URL:
http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf
[Accessed 13/11/2010]
 Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America:
ABC-CLIO.
 Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.

Contenu connexe

Tendances

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

Tendances (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

En vedette (12)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Similaire à Cybercrime online presentation

Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
Elizabeth Hall
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 

Similaire à Cybercrime online presentation (20)

Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cybercrime online presentation

  • 1. Research Assignment Communication Technologies & Change Sarah Johnson – u3025130 Tutorial Group #4
  • 2. Cybercrime is defined as: ‘computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks’ (Yar, 2006, p9)
  • 3.  Cracking – accessing computer systems without authority to commit a crime. Includes deliberately corrupting or erasing information within computer systems, defacing websites, and running copy-protected programs without a password or valid license string  Piracy – copying protected software without authorisation  Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  • 4.  Cyberstalking – using a computer to harass and terrorise selected human and institutional targets, causing them to fear injury or harm  Cyberpornography – producing and/or distributing pornography using a computer  Cyberterrorism – unlawful attacks and threats of attack by terrorists against computers, networks, and the information stored therein to intimidate or coerce a government or its people to further the perpetrator’s political or social objectives
  • 5.  Hacker unions or crews (domestic and foreign)  Organised crime  Foreign Intelligence Services  Botnet operators  Random individuals looking to take advantage of readily available black (underground) technologies (Fujitsu, 2009, p4)
  • 6.  In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime (Fujitsu, 2009, p3)  The 2005 AusCERT Australian Computer Crime and Security Survey found that in total, $16.9million was lost by 110 of the Australian organisations surveyed (Arias, 2007)  A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually (Edwards, 2009)
  • 7. The Commonwealth Cybercrime Bill 2001 – covers the following offences:  Unauthorised access, modification or impairment to commit a serious offence  Unauthorised modification of data to cause impairment  Unauthorised impairment of electronic communications  Possession of data with intent to commit computer offence (described as "akin to the more familiar offences of 'going equipped for stealing' or possession of an offensive weapon")  Supply of data with intent to commit a computer offence  Unauthorised access to restricted data  Unauthorised impairment of data held in a computer disk, credit card, etc. (Electronic Frontiers Australia, Inc., 2008)
  • 8. The Model Criminal Code – Chapter 4: Damage and Computing Offences  State & territory regulation of cybercrime  Contains a range of offences concerned with unauthorised access, modification and impairment of data  Further divided into Serious Computer Offences (Division 477) or Other Computer Offences (Division 478) (Clough, 2010, p44)
  • 9. For an in-depth exploration of Cybercrime and the implications it is having on Australian Society, read the “Cybercrime” research paper by Sarah Johnson.
  • 10.  Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet Business Law Services, Inc. Available from URL: http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews [Accessed 13/11/2010]  Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.  Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG Communications. Available from URL: http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_ report/ [Accessed 13/11/2010]  Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia: EFA, Inc. Available from URL: http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]  Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download from URL: http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf [Accessed 13/11/2010]  Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America: ABC-CLIO.  Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.