SlideShare a Scribd company logo
1 of 29
CYBER CRIMES
Ivy Rose B. Recierdo
BSED I - A
What is Cybercrime?
 Refers to all the activities done with criminal
intent in cyberspace.
 Refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
History
 The first
recorded
cybercrime took
place in the year
1820.
 When computers and networks came
into being in the 1990s, hacking was
done basically to get more
information about the systems.
 As hackers became more skilful, they
started using their knowledge and
expertise to gain benefit by exploiting
and victimizing others.
Causes of Cybercrime
 Accessing sensitive information and
data and using it means a rich
harvest of returns Hence, this has
led to a rise in cyber crime across the
world.
Classification of Computer
Crimes
 Fraud and financial crimes
 Cyber terrorism
 Cyber extortion
 Cyber warfare
Fraud and Financial
Crimes
 Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss. Result in
obtaining a benefit by:
Altering in an unauthorized way.
Altering, destroying, suppressing, or
stealing output, usually to conceal
unauthorized transactions.
Altering or deleting stored data
Cyber Terrorism
 Cyber Terrorism in general, can be
defined as an act of terrorism
committed through the use of
cyberspace or computer resources.
 A cyber terrorist is someone who
intimidates or coerces a government
or organization to advance his or her
political or social objectives by
launching a computer-based attack
against computers, networks, or the
information stored on them.
Cyber Extortion
 Cyber extortion occurs when a
website, e-mail server, or computer
system is subjected to or threatened
with repeated denial of service or
other attacks by malicious hackers.
 Hackers demand money in return for
promising to stop the attacks and to
offer "protection.”
Categorization of Cyber
Crime
 Individual
 Property
 Government
Types of Computer
Crimes
Hacking
 Hacking in
simple terms
means an illegal
intrusion into a
computer
system and/or
network.
Denial of Service (DoS)
Attack
 Act by the criminal, who
floods the bandwidth of the
victim’s network.
 In his e-mail box with spam
mail depriving him of the
services.
Cyber Stalking
 This is a kind of online harassment
wherein the victim is subjected to a
barrage of online messages and
emails. Typically, these stalkers know
their victims and instead of resorting
to offline stalking, they use the
Internet to stalk to make the victims’
lives more miserable.
Identity Theft
 In this cyber crime, a criminal
accesses data about a person’s bank
account, credit cards, Social Security,
debit card and other sensitive
information to steal money or to buy
things online in the victim’s name. It
can result in major financial losses for
the victim and even spoil the victim’s
credit history.
Malicious Software
 These are Internet-based software or
programs that are used to disrupt a
network. The software is used to gain
access to a system to steal sensitive
information or data or causing
damage to software present in the
system.
Child soliciting and Abuse
 This is also a type of cyber crime
wherein criminals solicit minors via
chat rooms for the purpose of child
pornography.
Computer Vandalism
 Damaging or destroying data rather
than stealing.
 Transmitting Virus
Cyber Terrorism
 Use of Internet base attacks in
terrorist activities.
Software Piracy
 Theft of software through the illegal
copying of genuine programs.
 Distribution of products intended to
pass for the original.
Virus Dissemination
 Malicious
software that
attaches itself
to other
software. (virus,
worms, Trojan
Horse, web
jacking, e-mail
bombing, etc.)
Categories Of Computer
Viruses
Categories of Computer
Viruses
 Boot Sector Viruses – infects the
boot record of a hard or floppy disk.
 Cluster Viruses – this type of virus
make changes to a disk’s file system.
 File-Infecting Viruses – this type of
virus infects program files on a disk
(such a EXE or COM files).
Categories of Computer
Viruses
 Worms – a worm is a program
whose purpose is to duplicate itself. It
is commonly spread over the Internet
via e-mail message attachments and
Internet Relay Chat (ICR).
 Bombs – this type of virus hides on
the user’s disk and waits for a
specific event to occur before
running.
Categories of Computer Viruses
 Trojan Horses – is a malicious
program that appears to be friendly,
they are not technically viruses. But,
because they can do harm, they are
considered viruses.
 Stealth Viruses – these viruses take
up residence in the computer’s
memory, making them hard to detect.
Categories of Computer
Viruses
 Polymorphic, Self-Garbling, Self-
Encrypting, or Self-Changing
Viruses – this type of virus can
change itself each time it is copied,
making it difficult to isolate.
 Macro Viruses – a virus designed to
infect a specific type of document file,
such as Microsoft Word or Excel files.
Computer Crimes

More Related Content

What's hot (20)

Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime
Computer crimeComputer crime
Computer crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
The role of erp for global businesses
The role of erp for global businessesThe role of erp for global businesses
The role of erp for global businessesasmamaw
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management pptAniket Pingale
 

Viewers also liked (8)

Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
La internet en la sociedad 5 to-a _nº 23 melany
La internet en la sociedad  5 to-a _nº 23  melanyLa internet en la sociedad  5 to-a _nº 23  melany
La internet en la sociedad 5 to-a _nº 23 melany
 
The role of erp for global businesses
The role of erp for global businessesThe role of erp for global businesses
The role of erp for global businesses
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Similar to Computer Crimes

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 

Similar to Computer Crimes (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

Recently uploaded

Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...anilsa9823
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecSapana Sha
 
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...Mona Rathore
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Delhi Call girls
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenSapana Sha
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxvemusae
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 

Recently uploaded (20)

Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
 
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
 
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 

Computer Crimes

  • 1. CYBER CRIMES Ivy Rose B. Recierdo BSED I - A
  • 2. What is Cybercrime?  Refers to all the activities done with criminal intent in cyberspace.  Refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 3. History  The first recorded cybercrime took place in the year 1820.
  • 4.  When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems.  As hackers became more skilful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.
  • 5.
  • 6. Causes of Cybercrime  Accessing sensitive information and data and using it means a rich harvest of returns Hence, this has led to a rise in cyber crime across the world.
  • 7. Classification of Computer Crimes  Fraud and financial crimes  Cyber terrorism  Cyber extortion  Cyber warfare
  • 8. Fraud and Financial Crimes  Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. Result in obtaining a benefit by: Altering in an unauthorized way.
  • 9. Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. Altering or deleting stored data
  • 10. Cyber Terrorism  Cyber Terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
  • 11.  A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them.
  • 12. Cyber Extortion  Cyber extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers.  Hackers demand money in return for promising to stop the attacks and to offer "protection.”
  • 13. Categorization of Cyber Crime  Individual  Property  Government
  • 15. Hacking  Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 16. Denial of Service (DoS) Attack  Act by the criminal, who floods the bandwidth of the victim’s network.  In his e-mail box with spam mail depriving him of the services.
  • 17. Cyber Stalking  This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk to make the victims’ lives more miserable.
  • 18. Identity Theft  In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 19. Malicious Software  These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  • 20. Child soliciting and Abuse  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.
  • 21. Computer Vandalism  Damaging or destroying data rather than stealing.  Transmitting Virus Cyber Terrorism  Use of Internet base attacks in terrorist activities.
  • 22. Software Piracy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 23. Virus Dissemination  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing, etc.)
  • 25. Categories of Computer Viruses  Boot Sector Viruses – infects the boot record of a hard or floppy disk.  Cluster Viruses – this type of virus make changes to a disk’s file system.  File-Infecting Viruses – this type of virus infects program files on a disk (such a EXE or COM files).
  • 26. Categories of Computer Viruses  Worms – a worm is a program whose purpose is to duplicate itself. It is commonly spread over the Internet via e-mail message attachments and Internet Relay Chat (ICR).  Bombs – this type of virus hides on the user’s disk and waits for a specific event to occur before running.
  • 27. Categories of Computer Viruses  Trojan Horses – is a malicious program that appears to be friendly, they are not technically viruses. But, because they can do harm, they are considered viruses.  Stealth Viruses – these viruses take up residence in the computer’s memory, making them hard to detect.
  • 28. Categories of Computer Viruses  Polymorphic, Self-Garbling, Self- Encrypting, or Self-Changing Viruses – this type of virus can change itself each time it is copied, making it difficult to isolate.  Macro Viruses – a virus designed to infect a specific type of document file, such as Microsoft Word or Excel files.