SlideShare a Scribd company logo
1 of 23
Cybercrime
Definition
Cybercrime
Computer crime
Virtual crime
Online crime
Digital crime
Technology / hi-tech crime
Electronic / e-crime
Internet crime / netcrime
Cybercrime
Definition
Susan Brenner Professor of Law at the University of Dayton, U.S.
The use of a computer to achieve illegal ends
Sherridan Morris Senior Research Officer at the Home Office, U.K.
Criminal or otherwise malicious activity utilising or directed towards the
Internet and/or information technology applications
Smith, Grabosky & Urbas Australian Institute of Criminology, Australian National University
Involves the use of digital technologies in the commission of the offence; or
Is directed at computing and communications technologies themselves; or
Is incidental to the commission of other crimes
Cybercrime
Instrument
Computer
A programmable electronic machine that performs automatic high-speed
mathematical or logical operations or that assembles, stores, correlates, or
otherwise processes information
Computer Systems
A system of one or more computers and associated software with common
storage
Cybercrime
Instrument
Information Technology
« The study, design, development, implementation, support or
management of computer-based information systems, particularly
software applications and computer hardware »
Information Technology Association of America
Information and Communication Technologies
An umbrella term that includes all technologies for the
communication of information
Cybercrime
Objective
1. Computer as the Target of Crime
2. Computer as the Intermediary of Crime
Cybercrime
1. Target
3 fundamental principles
• Integrity: data that has not been altered in an unauthorized
manner
• Availability: the accessibility of a computer or a network
• Confidentiality: data is not to be disclosed to those who are not
authorised to receive it
Cybercrime
1. Target
Malware: a malevolent software program deliberately created to
perform an unauthorized and often harmful action
• Viruses: A computer program that is designed to replicate itself
by copying itself into the other programs stored in a computer
• Worms: A destructive computer program that copies itself over
and over until it fills all of the storage space on a computer's
hard drive or on a network
• Trojans: A program that appears desirable but actually contains
something harmful
Cybercrime
1. Target
Other Malware: adware, spyware, rootkits
Hardware theft: physical devices such as computers,
components, multi media portable devices such as mobile
phones and personal assistants, cables
Service theft: wifi-spoofing/mooching, piggybakcing, war driving
Critical Information Infrastructure Attacks:
infrastructure associated with national security and with the
economic and social welfare of a nation
Cybercrime
2. Intermediairy
Property Crime
• Phishing: An activity which attempts to subtract sensitive and
personal information from a user by deceiving him.
• Botnets: A group of computers remotely controlled through an
application (bot) installed on an unprotected computer.
• ID Theft: Theft of personal and sensitive information about an
inidivdual.
Cybercrime
2. Intermediairy
• phishing
• spamming
• money laundering
• drug sale
• weapons trafficking
• virtual black markets
• economic espionage
• insider dealing
• market abuse
• intellectual property
infringements
• copyright violations
• software piracy
Economic Crime
Cybercrime
2. Intermediairy
Political Crime
• Political espionnage
• Sabotage
• Information Warfare
• Hacktivism
• Cyber attacks such as Critical Infrastructure Attacks
• Cyber terrorism (online training and propaganda)
Cybercrime
2. Intermediairy
• cyber stalking
• harassment
• hate speech
• sites displaying racial and
xenophobic content
• child pornography
• hooliganism
• vandalism
• moral offences relating to
cultural values
• fraud
• forgery
• extortion
Personal Crime
Legislation
International Instruments
1. Cooperation, Initiatives & Partnerships
2. Legislation
International Telecommunication Union
1. WSIS
2. GCA
Legislation
OECD
• 1983: research in criminal law problems of computer
related crimes
• 1992: Guidelines for the Security of Information Systems
G8
• 1997: Subgroup of High-Tech Crime
Legislation
OAS
• 1999: established a group of governmental experts on
cybercrime
APEC
• 2002: commitment to enact a comprehensive set of laws
relating to cybersecurity and cybercrime
ASEAN & China
• 2003: plan of action in 2003 to formulate cooperative and
emergency response procedures for enhancing
cybersecurity and combating cybercrime
Legislation
United Nations
• 1998 -2000: resolutions on Developments in the Field of
Information and Telecommunications in the Context of
International Security
• 2003: resolutions on Combating the Criminal Misuse of
Information Technology & on the Creation of a Global
Culture of Cybersecurity
Legislation
European Union
• 2003 - 2005: Council Framework Decision on attacks
against information systems
Commonwealth
• 2002: Model Law on Computer and Computer Related
Crime
Council of Europe
• 2001: Convention on Cybercrime
Legislation
Convention on Cybercrime
• Binding International Treaty
• Signed by 43 countries
• Ratified by 21
• substantive criminal law, procedural law, including
investigation and prosecution, jurisdiction and
international cooperation
Legislation
Convention on Cybercrime
• Very political since drafted by Western Democracies
(namely US & Europe)
• Heavy critiques regarding privacy rights & excessive
interference by state authorities
• Beyond scope of cybercrime: fraud, forgery, IP
infringements, child pornography
International Telecommunication Union
The Global Cybersecurity Agenda and Goal of a Model Cybercrime Law
5 Work Areas:
– Legal Measures
– Technical and Procedural Measures
– Organizational Structures
– Capacity Building
– International Cooperation
Legal Measures
The elaboration of strategies for the development of a model cybercrime legislation
that is globally applicable and interoperable with existing national and regional
legislative measures.
ITU Mandate
• Endorsed in 2001 by the UN General Assembly
Resolution 56/183
• Organizing agency: International Telecommunication
Union
• ITU mandated as the sole facilitator for Action Line C5
“Building confidence and security in the use of ICTs”
ITU
Outcomes
• Global Strategic Report
– General recommendations and proposals
• Understanding Cybercrime Guide
– Description of types of cybercrime
• Toolkit for Cybercrime Legislation
– Model law / sample language
Conclusions
Is international legislation possible?
Difficulty at UN level due to unique nature of
cybercrime and political tensions
Other solutions? Leads from similar cases –
Intellectual Property / International
Commerce

More Related Content

Similar to Cybercrime_PPT.ppt

Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfShylesh BC
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

Similar to Cybercrime_PPT.ppt (20)

CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

More from JiaJunWang17

LATHE PARTS AND FUNCTIONS.pptx
LATHE PARTS  AND FUNCTIONS.pptxLATHE PARTS  AND FUNCTIONS.pptx
LATHE PARTS AND FUNCTIONS.pptxJiaJunWang17
 
Business_Analysis_Decision_Analysis.ppt
Business_Analysis_Decision_Analysis.pptBusiness_Analysis_Decision_Analysis.ppt
Business_Analysis_Decision_Analysis.pptJiaJunWang17
 
Capacitacion_2016_pptx_pptx.pptx
Capacitacion_2016_pptx_pptx.pptxCapacitacion_2016_pptx_pptx.pptx
Capacitacion_2016_pptx_pptx.pptxJiaJunWang17
 
fontes_jud_rabinico_mestrado_jan_2014_pp.ppt
fontes_jud_rabinico_mestrado_jan_2014_pp.pptfontes_jud_rabinico_mestrado_jan_2014_pp.ppt
fontes_jud_rabinico_mestrado_jan_2014_pp.pptJiaJunWang17
 
PENGARATAN_PPT.pptx
PENGARATAN_PPT.pptxPENGARATAN_PPT.pptx
PENGARATAN_PPT.pptxJiaJunWang17
 
PPT_presentation_PaperKISMIF2016_ppt.ppt
PPT_presentation_PaperKISMIF2016_ppt.pptPPT_presentation_PaperKISMIF2016_ppt.ppt
PPT_presentation_PaperKISMIF2016_ppt.pptJiaJunWang17
 
El ciclo del hábito.pptx
El ciclo del hábito.pptxEl ciclo del hábito.pptx
El ciclo del hábito.pptxJiaJunWang17
 
Hatshepsut_PPT.pptx
Hatshepsut_PPT.pptxHatshepsut_PPT.pptx
Hatshepsut_PPT.pptxJiaJunWang17
 
hho_acctg09GE_inppt05_ppt.ppt
hho_acctg09GE_inppt05_ppt.ppthho_acctg09GE_inppt05_ppt.ppt
hho_acctg09GE_inppt05_ppt.pptJiaJunWang17
 
hho_acctg09GE_inppt05B_ppt.ppt
hho_acctg09GE_inppt05B_ppt.ppthho_acctg09GE_inppt05B_ppt.ppt
hho_acctg09GE_inppt05B_ppt.pptJiaJunWang17
 
hho_acctg09GE_inppt02_ppt (1).ppt
hho_acctg09GE_inppt02_ppt (1).ppthho_acctg09GE_inppt02_ppt (1).ppt
hho_acctg09GE_inppt02_ppt (1).pptJiaJunWang17
 
hho_acctg09GE_inppt06_ppt.ppt
hho_acctg09GE_inppt06_ppt.ppthho_acctg09GE_inppt06_ppt.ppt
hho_acctg09GE_inppt06_ppt.pptJiaJunWang17
 
Worksheet for a Merchandising Business.ppt
Worksheet for a Merchandising Business.pptWorksheet for a Merchandising Business.ppt
Worksheet for a Merchandising Business.pptJiaJunWang17
 

More from JiaJunWang17 (20)

LATHE PARTS AND FUNCTIONS.pptx
LATHE PARTS  AND FUNCTIONS.pptxLATHE PARTS  AND FUNCTIONS.pptx
LATHE PARTS AND FUNCTIONS.pptx
 
Cash flow model
Cash flow modelCash flow model
Cash flow model
 
Business_Analysis_Decision_Analysis.ppt
Business_Analysis_Decision_Analysis.pptBusiness_Analysis_Decision_Analysis.ppt
Business_Analysis_Decision_Analysis.ppt
 
Capacitacion_2016_pptx_pptx.pptx
Capacitacion_2016_pptx_pptx.pptxCapacitacion_2016_pptx_pptx.pptx
Capacitacion_2016_pptx_pptx.pptx
 
fontes_jud_rabinico_mestrado_jan_2014_pp.ppt
fontes_jud_rabinico_mestrado_jan_2014_pp.pptfontes_jud_rabinico_mestrado_jan_2014_pp.ppt
fontes_jud_rabinico_mestrado_jan_2014_pp.ppt
 
PENGARATAN_PPT.pptx
PENGARATAN_PPT.pptxPENGARATAN_PPT.pptx
PENGARATAN_PPT.pptx
 
neuroaids_ppt.ppt
neuroaids_ppt.pptneuroaids_ppt.ppt
neuroaids_ppt.ppt
 
PPT_presentation_PaperKISMIF2016_ppt.ppt
PPT_presentation_PaperKISMIF2016_ppt.pptPPT_presentation_PaperKISMIF2016_ppt.ppt
PPT_presentation_PaperKISMIF2016_ppt.ppt
 
PPT_MERCADOS.pptx
PPT_MERCADOS.pptxPPT_MERCADOS.pptx
PPT_MERCADOS.pptx
 
El ciclo del hábito.pptx
El ciclo del hábito.pptxEl ciclo del hábito.pptx
El ciclo del hábito.pptx
 
Hatshepsut_PPT.pptx
Hatshepsut_PPT.pptxHatshepsut_PPT.pptx
Hatshepsut_PPT.pptx
 
hho_acctg09GE_inppt05_ppt.ppt
hho_acctg09GE_inppt05_ppt.ppthho_acctg09GE_inppt05_ppt.ppt
hho_acctg09GE_inppt05_ppt.ppt
 
hho_acctg09GE_inppt05B_ppt.ppt
hho_acctg09GE_inppt05B_ppt.ppthho_acctg09GE_inppt05B_ppt.ppt
hho_acctg09GE_inppt05B_ppt.ppt
 
hho_acctg09GE_inppt02_ppt (1).ppt
hho_acctg09GE_inppt02_ppt (1).ppthho_acctg09GE_inppt02_ppt (1).ppt
hho_acctg09GE_inppt02_ppt (1).ppt
 
hho_acctg09GE_inppt06_ppt.ppt
hho_acctg09GE_inppt06_ppt.ppthho_acctg09GE_inppt06_ppt.ppt
hho_acctg09GE_inppt06_ppt.ppt
 
Worksheet for a Merchandising Business.ppt
Worksheet for a Merchandising Business.pptWorksheet for a Merchandising Business.ppt
Worksheet for a Merchandising Business.ppt
 
Akl_ppt.pptx
Akl_ppt.pptxAkl_ppt.pptx
Akl_ppt.pptx
 
vakum_ppt.pptx
vakum_ppt.pptxvakum_ppt.pptx
vakum_ppt.pptx
 
Arab spring.pptx
Arab spring.pptxArab spring.pptx
Arab spring.pptx
 
Matrix_PPT.pptx
Matrix_PPT.pptxMatrix_PPT.pptx
Matrix_PPT.pptx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Cybercrime_PPT.ppt

  • 1. Cybercrime Definition Cybercrime Computer crime Virtual crime Online crime Digital crime Technology / hi-tech crime Electronic / e-crime Internet crime / netcrime
  • 2. Cybercrime Definition Susan Brenner Professor of Law at the University of Dayton, U.S. The use of a computer to achieve illegal ends Sherridan Morris Senior Research Officer at the Home Office, U.K. Criminal or otherwise malicious activity utilising or directed towards the Internet and/or information technology applications Smith, Grabosky & Urbas Australian Institute of Criminology, Australian National University Involves the use of digital technologies in the commission of the offence; or Is directed at computing and communications technologies themselves; or Is incidental to the commission of other crimes
  • 3. Cybercrime Instrument Computer A programmable electronic machine that performs automatic high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information Computer Systems A system of one or more computers and associated software with common storage
  • 4. Cybercrime Instrument Information Technology « The study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware » Information Technology Association of America Information and Communication Technologies An umbrella term that includes all technologies for the communication of information
  • 5. Cybercrime Objective 1. Computer as the Target of Crime 2. Computer as the Intermediary of Crime
  • 6. Cybercrime 1. Target 3 fundamental principles • Integrity: data that has not been altered in an unauthorized manner • Availability: the accessibility of a computer or a network • Confidentiality: data is not to be disclosed to those who are not authorised to receive it
  • 7. Cybercrime 1. Target Malware: a malevolent software program deliberately created to perform an unauthorized and often harmful action • Viruses: A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer • Worms: A destructive computer program that copies itself over and over until it fills all of the storage space on a computer's hard drive or on a network • Trojans: A program that appears desirable but actually contains something harmful
  • 8. Cybercrime 1. Target Other Malware: adware, spyware, rootkits Hardware theft: physical devices such as computers, components, multi media portable devices such as mobile phones and personal assistants, cables Service theft: wifi-spoofing/mooching, piggybakcing, war driving Critical Information Infrastructure Attacks: infrastructure associated with national security and with the economic and social welfare of a nation
  • 9. Cybercrime 2. Intermediairy Property Crime • Phishing: An activity which attempts to subtract sensitive and personal information from a user by deceiving him. • Botnets: A group of computers remotely controlled through an application (bot) installed on an unprotected computer. • ID Theft: Theft of personal and sensitive information about an inidivdual.
  • 10. Cybercrime 2. Intermediairy • phishing • spamming • money laundering • drug sale • weapons trafficking • virtual black markets • economic espionage • insider dealing • market abuse • intellectual property infringements • copyright violations • software piracy Economic Crime
  • 11. Cybercrime 2. Intermediairy Political Crime • Political espionnage • Sabotage • Information Warfare • Hacktivism • Cyber attacks such as Critical Infrastructure Attacks • Cyber terrorism (online training and propaganda)
  • 12. Cybercrime 2. Intermediairy • cyber stalking • harassment • hate speech • sites displaying racial and xenophobic content • child pornography • hooliganism • vandalism • moral offences relating to cultural values • fraud • forgery • extortion Personal Crime
  • 13. Legislation International Instruments 1. Cooperation, Initiatives & Partnerships 2. Legislation International Telecommunication Union 1. WSIS 2. GCA
  • 14. Legislation OECD • 1983: research in criminal law problems of computer related crimes • 1992: Guidelines for the Security of Information Systems G8 • 1997: Subgroup of High-Tech Crime
  • 15. Legislation OAS • 1999: established a group of governmental experts on cybercrime APEC • 2002: commitment to enact a comprehensive set of laws relating to cybersecurity and cybercrime ASEAN & China • 2003: plan of action in 2003 to formulate cooperative and emergency response procedures for enhancing cybersecurity and combating cybercrime
  • 16. Legislation United Nations • 1998 -2000: resolutions on Developments in the Field of Information and Telecommunications in the Context of International Security • 2003: resolutions on Combating the Criminal Misuse of Information Technology & on the Creation of a Global Culture of Cybersecurity
  • 17. Legislation European Union • 2003 - 2005: Council Framework Decision on attacks against information systems Commonwealth • 2002: Model Law on Computer and Computer Related Crime Council of Europe • 2001: Convention on Cybercrime
  • 18. Legislation Convention on Cybercrime • Binding International Treaty • Signed by 43 countries • Ratified by 21 • substantive criminal law, procedural law, including investigation and prosecution, jurisdiction and international cooperation
  • 19. Legislation Convention on Cybercrime • Very political since drafted by Western Democracies (namely US & Europe) • Heavy critiques regarding privacy rights & excessive interference by state authorities • Beyond scope of cybercrime: fraud, forgery, IP infringements, child pornography
  • 20. International Telecommunication Union The Global Cybersecurity Agenda and Goal of a Model Cybercrime Law 5 Work Areas: – Legal Measures – Technical and Procedural Measures – Organizational Structures – Capacity Building – International Cooperation Legal Measures The elaboration of strategies for the development of a model cybercrime legislation that is globally applicable and interoperable with existing national and regional legislative measures.
  • 21. ITU Mandate • Endorsed in 2001 by the UN General Assembly Resolution 56/183 • Organizing agency: International Telecommunication Union • ITU mandated as the sole facilitator for Action Line C5 “Building confidence and security in the use of ICTs”
  • 22. ITU Outcomes • Global Strategic Report – General recommendations and proposals • Understanding Cybercrime Guide – Description of types of cybercrime • Toolkit for Cybercrime Legislation – Model law / sample language
  • 23. Conclusions Is international legislation possible? Difficulty at UN level due to unique nature of cybercrime and political tensions Other solutions? Leads from similar cases – Intellectual Property / International Commerce