SlideShare a Scribd company logo
1 of 18
High tech (cyber) crimes Elizabeth Hall Kaplan University CJ216-07 Erik Bernholdt 5.18.10
Types of Cyber Crimes Cyber Vandalism/Computer Crimes Technology Crimes Cyber Theft/Computer Related Crimes Cyber Warfare (Siegel, 2010) (Foster, 2000)
Cyber Vandalism Computer Crime in which the computer or the performance of the computer is attacked   Carried out through the computer for malevolent intent,  vengeance, or damage (Siegel, 2010) (Foster, 2000)
Types of Cyber Vandalism Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers.    Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers,  remote access programs, open pornography sites on its own, and access to total control over computer.  Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information (Siegel, 2010) (Foster, 2000)
Types of Cyber Vandalism 2 Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc.     Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly This crime generally means malicious or harmful actions directed at computers or persons via internet (Siegel, 2010) (Foster, 2000)
Technology Crimes Technology used in crime commission other than computers themselves- includes software These crimes often affect the elderly through phone scams promising large cash prizes  after giving up personal information such as bank account numbers, or social security numbers. (Siegel, 2010) (Foster, 2000)
Types of Technology Crimes Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people  Software Piracy- illegal downloads of software from the internet (Siegel, 2010) (Foster, 2000)
Types of Technology Crimes  Shoplifting Software Physically stealing hardware for resale or information  Theft of cable services (Siegel, 2010) (Foster, 2000)
Types of Technology Crimes 2 Duplicating Software  Selling duplicated software via internet or otherwise This crime generally means using technology other than computers in commission of crime (Siegel, 2010) (Foster, 2000)
Cyber Theft Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous. (Siegel, 2010) (Foster, 2000)
Types of cyber theft  Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Denial of Services Attack- used to annoy or extract money from web users by preventing access to service  (Siegel, 2010) (Foster, 2000)
Types of cyber theft 2  Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information (Siegel, 2010) (Foster, 2000)
Types of cyber theft 3  Phishing- duplicating legitimate websites in order to obtain personal information  E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds (Siegel, 2010) (Foster, 2000)
Cyber Warfare Cyber crime in which perpetrators have political motives attached These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information (Siegel, 2010) (Foster, 2000)
Types of Cyber Warfare  Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines.  Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab.  Can also be used to attack electric power and essential services (Siegel, 2010) (Foster, 2000)
Controlling Cybercrime The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training (Siegel, 2010) (Foster, 2000)
Controlling Cybercrime 2 Some of these challenges include:  Global nature of cybercrime High tech crimes are often misclassified causing  Statistical information to be skewed Allocation of funds usually favors traditional crimes because of skewed statistics Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR  (Siegel, 2010) (Foster, 2000)
References Foster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice Hall Siegel, L.J. (2010).  Criminology: Theories, Patterns, and Typologies.  Tenth Edition.  Belmont:                   Wadsworth Cengage Learning.

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
cyber crime
cyber crimecyber crime
cyber crimeNauman Ali
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked

Unit2 project elizbeth hall
Unit2 project elizbeth hallUnit2 project elizbeth hall
Unit2 project elizbeth hallElizabeth Hall
 
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...Elizabeth Hall
 
CAPITAL PUNISHMENT
CAPITAL PUNISHMENTCAPITAL PUNISHMENT
CAPITAL PUNISHMENTKeerthi S. Nair
 
Crime and its types
Crime and its typesCrime and its types
Crime and its typesAsad Ali
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 
Ppt jobs and occupations
Ppt jobs and occupationsPpt jobs and occupations
Ppt jobs and occupationssilviaupna
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 

Viewers also liked (10)

Unit2 project elizbeth hall
Unit2 project elizbeth hallUnit2 project elizbeth hall
Unit2 project elizbeth hall
 
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
 
Crimes & punishments
Crimes & punishmentsCrimes & punishments
Crimes & punishments
 
CAPITAL PUNISHMENT
CAPITAL PUNISHMENTCAPITAL PUNISHMENT
CAPITAL PUNISHMENT
 
Types of Crime
 Types of Crime  Types of Crime
Types of Crime
 
Crime and its types
Crime and its typesCrime and its types
Crime and its types
 
Criminal law.power point....
Criminal law.power point....Criminal law.power point....
Criminal law.power point....
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
Ppt jobs and occupations
Ppt jobs and occupationsPpt jobs and occupations
Ppt jobs and occupations
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 

Similar to High Tech (Cyber) Crimes

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
Cybercrime9410953429
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptxmnm Lastopop
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Internet
InternetInternet
InternetJodip
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Computer Crime
Computer CrimeComputer Crime
Computer CrimeFarjana Akter
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data ProtectionDr. Hemant Kumar Singh
 

Similar to High Tech (Cyber) Crimes (20)

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet
InternetInternet
Internet
 
English in written
English in writtenEnglish in written
English in written
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Polinter11
Polinter11Polinter11
Polinter11
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 

More from Elizabeth Hall

Unit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyUnit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyElizabeth Hall
 
Unit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionUnit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionElizabeth Hall
 
Unit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesUnit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesElizabeth Hall
 
Unit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseUnit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseElizabeth Hall
 
Unit 7 project 9 11 attacks
Unit 7  project 9 11 attacksUnit 7  project 9 11 attacks
Unit 7 project 9 11 attacksElizabeth Hall
 
Unit 8 project identifying crime patterns e hall
Unit 8 project identifying  crime patterns e hallUnit 8 project identifying  crime patterns e hall
Unit 8 project identifying crime patterns e hallElizabeth Hall
 
Unit 9 project elizbeth hall
Unit 9 project elizbeth hallUnit 9 project elizbeth hall
Unit 9 project elizbeth hallElizabeth Hall
 
Unit 5 project elizbeth hall
Unit 5 project elizbeth hallUnit 5 project elizbeth hall
Unit 5 project elizbeth hallElizabeth Hall
 
Unit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallUnit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallElizabeth Hall
 
Unit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallUnit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallElizabeth Hall
 
Unit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallUnit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallElizabeth Hall
 
Unit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallUnit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallElizabeth Hall
 
Unit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallUnit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallElizabeth Hall
 
Hall elizabeth unit nine project
Hall elizabeth unit nine projectHall elizabeth unit nine project
Hall elizabeth unit nine projectElizabeth Hall
 
Police Information Acces
Police Information AccesPolice Information Acces
Police Information AccesElizabeth Hall
 
Hall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperHall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperElizabeth Hall
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismElizabeth Hall
 
The Greatest Threat To Society
The Greatest Threat To SocietyThe Greatest Threat To Society
The Greatest Threat To SocietyElizabeth Hall
 

More from Elizabeth Hall (20)

Unit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyUnit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competency
 
Unit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionUnit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selection
 
Unit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesUnit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological roles
 
Unit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseUnit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defense
 
Unit 7 project 9 11 attacks
Unit 7  project 9 11 attacksUnit 7  project 9 11 attacks
Unit 7 project 9 11 attacks
 
Unit 8 project identifying crime patterns e hall
Unit 8 project identifying  crime patterns e hallUnit 8 project identifying  crime patterns e hall
Unit 8 project identifying crime patterns e hall
 
Unit 9 project elizbeth hall
Unit 9 project elizbeth hallUnit 9 project elizbeth hall
Unit 9 project elizbeth hall
 
Unit 5 project elizbeth hall
Unit 5 project elizbeth hallUnit 5 project elizbeth hall
Unit 5 project elizbeth hall
 
Unit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallUnit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hall
 
Unit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallUnit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hall
 
Unit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallUnit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hall
 
Unit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallUnit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hall
 
Unit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallUnit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hall
 
Hall elizabeth unit nine project
Hall elizabeth unit nine projectHall elizabeth unit nine project
Hall elizabeth unit nine project
 
Police Information Acces
Police Information AccesPolice Information Acces
Police Information Acces
 
Hall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperHall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup Paper
 
Unit 5 Project
Unit 5 ProjectUnit 5 Project
Unit 5 Project
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And Terrorism
 
Unit 5 Project
Unit 5 ProjectUnit 5 Project
Unit 5 Project
 
The Greatest Threat To Society
The Greatest Threat To SocietyThe Greatest Threat To Society
The Greatest Threat To Society
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

High Tech (Cyber) Crimes

  • 1. High tech (cyber) crimes Elizabeth Hall Kaplan University CJ216-07 Erik Bernholdt 5.18.10
  • 2. Types of Cyber Crimes Cyber Vandalism/Computer Crimes Technology Crimes Cyber Theft/Computer Related Crimes Cyber Warfare (Siegel, 2010) (Foster, 2000)
  • 3. Cyber Vandalism Computer Crime in which the computer or the performance of the computer is attacked Carried out through the computer for malevolent intent, vengeance, or damage (Siegel, 2010) (Foster, 2000)
  • 4. Types of Cyber Vandalism Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information (Siegel, 2010) (Foster, 2000)
  • 5. Types of Cyber Vandalism 2 Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc. Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly This crime generally means malicious or harmful actions directed at computers or persons via internet (Siegel, 2010) (Foster, 2000)
  • 6. Technology Crimes Technology used in crime commission other than computers themselves- includes software These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers. (Siegel, 2010) (Foster, 2000)
  • 7. Types of Technology Crimes Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet (Siegel, 2010) (Foster, 2000)
  • 8. Types of Technology Crimes Shoplifting Software Physically stealing hardware for resale or information Theft of cable services (Siegel, 2010) (Foster, 2000)
  • 9. Types of Technology Crimes 2 Duplicating Software Selling duplicated software via internet or otherwise This crime generally means using technology other than computers in commission of crime (Siegel, 2010) (Foster, 2000)
  • 10. Cyber Theft Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous. (Siegel, 2010) (Foster, 2000)
  • 11. Types of cyber theft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Denial of Services Attack- used to annoy or extract money from web users by preventing access to service (Siegel, 2010) (Foster, 2000)
  • 12. Types of cyber theft 2 Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information (Siegel, 2010) (Foster, 2000)
  • 13. Types of cyber theft 3 Phishing- duplicating legitimate websites in order to obtain personal information E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds (Siegel, 2010) (Foster, 2000)
  • 14. Cyber Warfare Cyber crime in which perpetrators have political motives attached These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information (Siegel, 2010) (Foster, 2000)
  • 15. Types of Cyber Warfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services (Siegel, 2010) (Foster, 2000)
  • 16. Controlling Cybercrime The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training (Siegel, 2010) (Foster, 2000)
  • 17. Controlling Cybercrime 2 Some of these challenges include: Global nature of cybercrime High tech crimes are often misclassified causing Statistical information to be skewed Allocation of funds usually favors traditional crimes because of skewed statistics Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR (Siegel, 2010) (Foster, 2000)
  • 18. References Foster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice Hall Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. Belmont: Wadsworth Cengage Learning.