cyber crime final

Post on 16-Jan-2017

60 Views

Category:

Social Media

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Crime

“What is Crime”Harmful act against the public which the

State wishes to prevent, and is punishable by fine, imprisonment, and/or death.

Examples

Computer Crime or Cyber Crime

Crime that involves a Computer and a Network.

Purposes of Cyber CrimeStealing a person’s identityMaking MoneyHarassing SomeoneGetting Secret Records or PasswordsAssessing someone personal Data

Categories of Cyber CrimeComputer as a Weapon; using a Computer to

commit real World Crime.Computer as a Target; using a Computer to

attack on other Computer

Classification of Cyber Crime Against Person

i. Hackingii. Harassment

Against Propertyi. Intellectual property crimesii. Hacking Computer System

Against Governmenti. Cyber Terrorismii. Information

Types of Cyber CrimesHackingComputer VandalismCyber TerrorismSoftware Privacy

Hacking Crime wherein a person’s computer is broken into so

that his personal or sensitive information can be accessed

Also known as Cracking.Government websites are the hot targets of hackers.

Computer Vandalism

Damaging or destroying the data rather than stealing or misusing

Transmitting Viruses; These are the programs that attach themselves to a file and then circulate from one computer to other.

Cyber TerrorismThe politically motivated use of computers

and information technology to cause severe disruption or widespread fear.

Using Computer and Network to spread fear in among civilians.

Software Privacy Illegal copying, distribution, or use

of softwareAccording to the Business Software Alliance

(BSA), about 36% of all software in current use is stolen.

Built to protect the privacy of its users

Safety Tips

Safety Tips To CybercrimeUse Antivirus Software’sUninstall Unnecessary SoftwareMaintain backup Check security settingsNever give your full name or address to

strangers.

Security

Advantages of Cyber Security

This Security will defend us from critical attacks

Helps us to browse the safe websiteSecure all the incoming and outgoing data on

our computer

THANKS FOR WATCHING

top related