CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
Cybercrimes
1. CYBER CRIMES
MALAYSIAN UNIVERSITY ENGLISH TEST (MUET) UNIT
ASSIGNMENT 4
MUET
800/2 SPEAKING
PREPARED BY:
1. MUHAMMAD IMTIYAZ BIN MOHAMAD SOKRI
2. AHMAD LUQMAN BIN MOHD FADZIL
3. MOHD FITRI FAHMI BIN HASMADI
4. AIMAN ASYRAF BIN OTHMAN
2.
3.
4. INTRODUCTION
• Cyber crime is an activity done using
computers and internet. We can say that it
is an unlawful acts wherein the computer
either a tool or target or both.
5. HISTORY OF CYBER CRIME
• When computers and networks came into being in the
1990s, hacking was done basically to get more
information about the systems.
• As a result, many networks were affected; right from the
military to commercial organizations.
• However, with malicious software becoming ubiquitous
during the same period, hacking started making networks
and systems slow.
• As hackers became more skillful, they started using their
knowledge and expertise to gain benefit by exploiting and
victimizing others
6. DEFINITION OF CYBER CRIME
• Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes
conducted through the internet. For example; hate
crimes, telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to be cyber
crimes when the illegal activities are committed through
the use of a computer and the Internet.
• Involves illegal imports,malicious programs
7. TYPES OF CYBER CRIMES:
• HACKING
• CYBER TERRORISM
• EMAIL SPOOFING
• PHISHING
• SOFTWARE PIRACY
• CHILD ABUSE
The main cause of cybercrime is accessing sensitive
information and data and using it means a rich harvest of
returns and catching such criminals is difficult.
Hence, this has led to a rise in cyber crime across the
world
8. Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Software Piracy - Theft of software through the illegal
copying of genuine programs or the counterfeiting
and distribution of products intended to pass for
the original. The unauthorized copying of software.
9. Email spoofing - A spoofed email is one that appears
to originate from one source but actually has been
sent from another source.
Phishing - The e-mail directs the user to visit a Web
site where they are asked to update personal
information, such as passwords and credit card, social
security, and bank account numbers, that the legitimate
organization already has .
Cyber Terrorism- Terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and
hate E-mails , attacks on service network etc.
10. • Child Pornography - The Internet is being highly
used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access
to internet, more children would be using the
internet and more are the chances of falling victim
to the aggression of Pedophiles.
How Do They Operate:
How do they operate Pedophiles use false identity
to trap the children , Pedophiles connect children in
various chat rooms which are used by children to
interact with other children.
11. CATEGORIES OF CYBER CRIME
• INDIVIDUAL
- This type of cyber crime can be in the form of cyber stalking,
distributing pornography, trafficking and “grooming”.
• PROPERTY
- Steal a person’s bank details and siphon off money,misuse the
credit card to make numerous purchases online,use malicious
software to gain access to an organization’s website or disrupt
the systems of the organization.
• GOVERNMENT
- Referred to as cyber terrorism. If successful, this category can
wreak havoc and cause panic amongst the civilian population.
In this category, criminals hack government websites, military
websites or circulate propaganda
13. User awareness is key to a secure computer/network
Do not open suspicious files/emails
Avoid using P2P(Peer-to-peer) programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you will
be hacked. What’s more, you deserve to be hacked. —
White House Cybersecurity Advisor” ─ Richard Clarke