2. Introduction
Also known as cyber crime
Crimes done through impacting computers,
computer systems or network
Use of computer for illegal ends such as fraud,
violating privacy, stealing identities etc.
Mainly home users are attacked by cybercriminal as they do not have
proper security.
2
3. Types of computer crime
Viruses and worms
Malware
Hacking
Daniel of service
Software piracy
Fraud
Cyber stalking
Offensive contents
Spam
3
4. Hacking
Gaining of unauthorized access to the data in a system or computer
Example: Password cracking algorithm
Various types of hackers such as:
Black hat hacker
White hat hackers
Grey hat hackers
4
Types of computer crime …
5. Software Piracy
Unauthorized copying of purchased software.
Copies the software from its original floppy disk or compact disk.
It gives up the right to receive upgrades and technical support, but they
gain the use of the program without paying for it.
5
Types of computer crime …
6. Fraud
Act of using computer to take electronic data.
Examples :
• offering nonexistent goods to a buyer
• stealing someone’s funds by hacking into his bank or credit card account,
• or illegally using access devices, such as those of a paid news subscription service
6
Types of computer crime …
7. Cyber Stalking
Repeated use of electronic communication to harass or frighten someone.
It involves incidents or actions such as threat, defamation, and sexual harassment
etc.
A stalker maybe an online stranger or a person whom the target know.
7
Types of computer crime …
9. Computer crime in Nepal
Cases of Cybercrime in Nepal shall be initiated by Government of Nepal as plaintiff
and such a case shall be deemed have been included in Schedule 1 of the State
Cases Act, 1992 (2049).
In Nepal cyber law is called as Electronic Transaction Act (ETA) 2063, which were
passed in 2004.
Lack of knowledge in investigation, analysis and judicial interpretation of cybercrime
9
10. Prevention of computer crime
Data and message security
Encryption and decryption
Fire wall
10
11. Data and message security
Concerns protection of data and message.
The threats to message security fall into three categories:
Message confidentiality
Message and system integrity
Message sender authentication/identification
11
Main page
Prevention of computer crime …
12. Encryption
Process of translating plaintext data Into coded form to
prevent unauthorized access
Also known as cryptography
Encryptions are classified into two groups:
Symmetric encryption
Asymmetric encryption
12
Main page
Prevention of computer crime …
13. Fire wall
Software program or hardware device that protects the
resources of a network or workstation as of users from other
networks.
Frequently used to prevent unauthorized internet users from
accessing private networks connected to the internet.
It may be software firewall or hardware firewall.
13
Main page
Prevention of computer crime …
14. Conclusion
Computer crime has been a great issue as the use of internet is growing
rapidly
Computer crime is usually done for gaining profit or for personal purpose.
However there is lack of knowledge and investigation of computer crime in
Nepal
There must be made strict law for cybercrime. Individuals must be alert as they
have been using social Medias rapidly
Thus, cybercrime is not a simple thing; it can destroy any information easily
14