cyber crime what is computer crime? computer crime refers to any crime that involves a computer and...
TRANSCRIPT
![Page 1: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/1.jpg)
CYBER CRIME
![Page 2: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/2.jpg)
What is computer crime?
• Computer crime refers to any crime that involves a computer and a network.
• The computer may have been used in the commission of a crime.
• Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health.
![Page 3: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/3.jpg)
Types of computer crimes
Internet Child Pornography
Illegal Gambing
Identify Theft
Storing Illegal information
Fraud
![Page 4: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/4.jpg)
Internet Child Pornography
• Producing, possessing, or distributing images of minors (anyone under the age of 18) engaged in sexual.
• According to California Penal Code § 311, this California Law is aimed at stopping the flow of child pornography, which can be easily accomplished today by means of the Internet.
![Page 5: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/5.jpg)
Illegal Gambling
Games that involve monetary transactions, such as transfers to and from credit cards
and bank accounts, are considered illegal, so gamblers cannot legally collect
their winnings.
![Page 6: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/6.jpg)
Identify Theft
• Some criminals use the Internet to break into victims' online financial accounts, taking passwords, money and sensitive information.
• Others create online centers for trafficking stolen identity information.
• People that use birthdays, their children's names and pet names as passwords are typically more at risk for identity theft.
![Page 7: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/7.jpg)
Storing Illegal Information
• Criminals and pedophiles often use the Internet to obtain and transfer illegal images, such as child pornography.
• Other criminals use their computer databases to store illegal information, including confidential intellectual property.
![Page 8: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/8.jpg)
Fraud
• In the digital age, many criminals easily commit fraud against
unsuspecting victims by misrepresenting the facts.
• For example, an employee intentionally inputs false
information into the company database or internet.
![Page 9: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/9.jpg)
Computer Viruses
• Computer hackers are digital age criminals that can bring down large
infrastructures with a single keystroke emitting a computer virus.
These types of viruses are macro or binary.
• Macro viruses attack a specific program, while binary viruses attack
data or attach to program files.
• One of the most famous computer viruses is the Trojan virus.
![Page 10: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/10.jpg)
Types of computer crimes
Password
Anti-virus
software
Attachment of e-mail
Firewall
![Page 11: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/11.jpg)
Password
• Make the length of your password at least five characters. It is too easy for automatic programs to sequentially try all combinations of characters in a password of only 1, 2, 3, or 4 characters.
• To make a long password, use a concatenation of two words, each with at least five characters, perhaps separated by one digit (e.g., airplane5style).
![Page 12: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/12.jpg)
Anti-virus software
• It became common to distribute software and updates via downloads from the Internet
• hackers developed viruses that were delivered inside macros for Microsoft Word, which malicious macros could be hidden inside a document sent by e-mail, and
• hackers developed malicious computer programs that were commonly distributed as attachments to e-mail: clicking on the attachment executed the malicious computer program and infected the victim's computer.
![Page 13: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/13.jpg)
Attachment of e-mail
• Never open an executable attachment .• Never open any attachment from an unknown source.
• Be cautious of any attachment that has a double file extension, especially when the rightmost file extension is an executable file type.
![Page 14: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/14.jpg)
Firewall
• It is good practice to erect a "firewall"
between parts of a computer system that an
external user can access (e.g., via modem or
Internet or voice mail) and parts that are
supposedly accessible only by a local user.
![Page 15: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/15.jpg)
Conclusion
When a criminal perpetrates a crime, his attorney is
likely to say that the criminal did everyone a favor by calling
attention to lapses in security of computers. It is a criminal
defense attorney's job to put the best possible spin on the
client's horrible activities. However, recognize that "blaming
the victim" for the crime is a cheap shot. Even if the victim
behaved in an imprudent way, a victim never invites a crime.
![Page 16: CYBER CRIME What is computer crime? Computer crime refers to any crime that involves a computer and a network.computernetwork The computer may have been](https://reader036.vdocuments.us/reader036/viewer/2022082611/56649e945503460f94b991fd/html5/thumbnails/16.jpg)
Thank you!