CYBER CRIME     Done by: Mohammed Tariq
CONTENT:What is CYBERCRIME?Forms of CybercrimePerpetrators of CybercrimeImplications of CybercrimeConclusion
WHAT IS CYBERCRIME?Cybercrime is defined as:         computer-mediated activities which are eitherillegal or considered il...
FORMS OF CYBERCRIMEPiracy – copying protected software withoutauthorisation
FORMS OF CYBERCRIMECracking – accessing computer systems withoutauthority to commit a crime.
FORMS OF CYBERCRIMEPhreaking – manipulating a phone system usinga computer or other device to obtain free telephonecalls ...
FORMS OF CYBERCRIMECyber stalking – using a computer to harass andterrorise selected human and institutional targets,caus...
FORMS OF CYBERCRIMECyber terrorism – unlawful attacks and threatsof attack by terrorists against computers, networks,and ...
FORMS OF CYBERCRIMECyber pornography – producing and/ordistributing pornography using a computer
P E R P E T R AT O R S O F             C Y B E RC R I M EHacker unions or crews (domestic and foreign)Organised crimeFo...
I M P L I C AT I O N S O F               C Y B E RC R I M EIn 2008, security vendor AVG conducted a surveyinto global cyb...
I M P L I C AT I O N S O F               C Y B E RC R I M EA recent report by the Australian Institute ofCriminology foun...
CONCLUSION Cyber crime refers to illegal activities that take place online,including fraud, spam, identity theft, compute...
REFERENCE LIST: http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews http://www.computerworld.com...
Upcoming SlideShare
Loading in …5
×

Mohammed tariq alsharhan

2,223 views

Published on

Published in: Design, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,223
On SlideShare
0
From Embeds
0
Number of Embeds
147
Actions
Shares
0
Downloads
190
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Mohammed tariq alsharhan

  1. 1. CYBER CRIME Done by: Mohammed Tariq
  2. 2. CONTENT:What is CYBERCRIME?Forms of CybercrimePerpetrators of CybercrimeImplications of CybercrimeConclusion
  3. 3. WHAT IS CYBERCRIME?Cybercrime is defined as: computer-mediated activities which are eitherillegal or considered illicit by certain parties and whichcan be conducted through global electronic networks’
  4. 4. FORMS OF CYBERCRIMEPiracy – copying protected software withoutauthorisation
  5. 5. FORMS OF CYBERCRIMECracking – accessing computer systems withoutauthority to commit a crime.
  6. 6. FORMS OF CYBERCRIMEPhreaking – manipulating a phone system usinga computer or other device to obtain free telephonecalls or charge calls to another account
  7. 7. FORMS OF CYBERCRIMECyber stalking – using a computer to harass andterrorise selected human and institutional targets,causing them to fear injury or harm
  8. 8. FORMS OF CYBERCRIMECyber terrorism – unlawful attacks and threatsof attack by terrorists against computers, networks,and the information stored therein to intimidate orcoerce a government or its people to further theperpetrator’s political or social objectives
  9. 9. FORMS OF CYBERCRIMECyber pornography – producing and/ordistributing pornography using a computer
  10. 10. P E R P E T R AT O R S O F C Y B E RC R I M EHacker unions or crews (domestic and foreign)Organised crimeForeign Intelligence ServicesBotnet operatorsRandom people
  11. 11. I M P L I C AT I O N S O F C Y B E RC R I M EIn 2008, security vendor AVG conducted a surveyinto global cybercrime and found that Australia hasthe highest incidence of cyber crime in the worldwith more than 39 per cent of Australian’s havingbeen the victim of cyber crime
  12. 12. I M P L I C AT I O N S O F C Y B E RC R I M EA recent report by the Australian Institute ofCriminology found that cybercrime is costingAustralian businesses more than $600 millionannually
  13. 13. CONCLUSION Cyber crime refers to illegal activities that take place online,including fraud, spam, identity theft, computer viruses andworms, cyber stalking, drug trafficking, sexual predators,malware or spyware, phishing schemes and the like. Mostpeople become victims of these at one time or another.
  14. 14. REFERENCE LIST: http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_report/

×