Top 5 Omuter


Published on

This presentation shows the Top 5 Computer Crime's which we eldolge every day.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Top 5 Omuter

  1. 1. COMPUTER CRIMES<br />TOP 5<br />
  2. 2.
  3. 3. 5<br />
  4. 4. Computer Fraud<br />Happens when a victim is conned into believing that he will receive money or something else value.<br />“being aware” <br />
  5. 5. Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.<br />
  6. 6. Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims. <br />
  7. 7.
  8. 8. 4<br />
  9. 9. Computer Industrial<br />is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.<br />
  10. 10. In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.<br />
  11. 11.
  12. 12. 3<br />
  13. 13. Computer Virus Transmitter<br />Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data.<br /><br />
  14. 14. Malware<br />A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.<br />Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.<br />Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.<br />
  15. 15.
  16. 16. 2<br />
  17. 17. Software Piracy<br />Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.<br />
  18. 18.
  19. 19. 1<br />
  20. 20. Child Pornography<br />(under Age 18) through he Internet is a crime.<br />The Internet Has also been used as a tool for child prostitution.<br />Pedophiles have used chat rooms to lure minors into illegal sexual encounters.<br />
  21. 21.
  22. 22. “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” <br />
  23. 23. Thank You <br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.