SlideShare a Scribd company logo
1 of 20
CYBER CRIMES
MALAYSIAN UNIVERSITY ENGLISH TEST (MUET) UNIT
ASSIGNMENT 4
MUET
800/2 SPEAKING
PREPARED BY:
1. MUHAMMAD IMTIYAZ BIN MOHAMAD SOKRI
2. AHMAD LUQMAN BIN MOHD FADZIL
3. MOHD FITRI FAHMI BIN HASMADI
4. AIMAN ASYRAF BIN OTHMAN
INTRODUCTION
• Cyber crime is an activity done using
computers and internet. We can say that it
is an unlawful acts wherein the computer
either a tool or target or both.
HISTORY OF CYBER CRIME
• When computers and networks came into being in the
1990s, hacking was done basically to get more
information about the systems.
• As a result, many networks were affected; right from the
military to commercial organizations.
• However, with malicious software becoming ubiquitous
during the same period, hacking started making networks
and systems slow.
• As hackers became more skillful, they started using their
knowledge and expertise to gain benefit by exploiting and
victimizing others
DEFINITION OF CYBER CRIME
• Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes
conducted through the internet. For example; hate
crimes, telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to be cyber
crimes when the illegal activities are committed through
the use of a computer and the Internet.
• Involves illegal imports,malicious programs
TYPES OF CYBER CRIMES:
• HACKING
• CYBER TERRORISM
• EMAIL SPOOFING
• PHISHING
• SOFTWARE PIRACY
• CHILD ABUSE
 The main cause of cybercrime is accessing sensitive
information and data and using it means a rich harvest of
returns and catching such criminals is difficult.
 Hence, this has led to a rise in cyber crime across the
world
Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Software Piracy - Theft of software through the illegal
copying of genuine programs or the counterfeiting
and distribution of products intended to pass for
the original. The unauthorized copying of software.
Email spoofing - A spoofed email is one that appears
to originate from one source but actually has been
sent from another source.
Phishing - The e-mail directs the user to visit a Web
site where they are asked to update personal
information, such as passwords and credit card, social
security, and bank account numbers, that the legitimate
organization already has .
Cyber Terrorism- Terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and
hate E-mails , attacks on service network etc.
• Child Pornography - The Internet is being highly
used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access
to internet, more children would be using the
internet and more are the chances of falling victim
to the aggression of Pedophiles.
How Do They Operate:
How do they operate Pedophiles use false identity
to trap the children , Pedophiles connect children in
various chat rooms which are used by children to
interact with other children.
CATEGORIES OF CYBER CRIME
• INDIVIDUAL
- This type of cyber crime can be in the form of cyber stalking,
distributing pornography, trafficking and “grooming”.
• PROPERTY
- Steal a person’s bank details and siphon off money,misuse the
credit card to make numerous purchases online,use malicious
software to gain access to an organization’s website or disrupt
the systems of the organization.
• GOVERNMENT
- Referred to as cyber terrorism. If successful, this category can
wreak havoc and cause panic amongst the civilian population.
In this category, criminals hack government websites, military
websites or circulate propaganda
PREVENTION OF CYBER CRIME
 Anti-virus software .
 Frequent password changing.
 Firewalls.
 Safe surfing.
 Frequent virus checks.
 Email filters.
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P(Peer-to-peer) programs
 Avoid downloading freeware
 If attacked, disconnect the network. Do not turn off the
computer
 So we must pay attention to all those issues and protect the
World from Cyber Crime
 “If you spend more on coffee than on IT security, you will
be hacked. What’s more, you deserve to be hacked. —
White House Cybersecurity Advisor” ─ Richard Clarke
ATTACHMENTS :
REFERENCES:
• http://www.crossdomainsolutions.com/cyber-crime/
Cybercrimes

More Related Content

What's hot

Lanun di perairan asia tenggara
Lanun di perairan asia tenggaraLanun di perairan asia tenggara
Lanun di perairan asia tenggaraPizza Hut
 
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKA
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKAKESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKA
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKAMISS ESTHER
 
Kanun Prosedur Jenayah (Akta 593)
Kanun Prosedur Jenayah (Akta 593)Kanun Prosedur Jenayah (Akta 593)
Kanun Prosedur Jenayah (Akta 593)NaimAlmashoori
 
Senarai istilah umum kehakiman
Senarai istilah umum kehakiman Senarai istilah umum kehakiman
Senarai istilah umum kehakiman ShahrilAiman
 
Jenayah siber
Jenayah siber Jenayah siber
Jenayah siber Darx Sidez
 
Tadbir Urus Negara-1.pdf
Tadbir Urus Negara-1.pdfTadbir Urus Negara-1.pdf
Tadbir Urus Negara-1.pdfElvinaWong4
 
Sosial dan budaya pa (2)
Sosial dan budaya pa (2)Sosial dan budaya pa (2)
Sosial dan budaya pa (2)Nur Hidayah
 
Sosial media presentation
Sosial media presentationSosial media presentation
Sosial media presentationSmile Johor
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tangan
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tanganHuraikan bentuk pentadbiran masyarakat melayu sebelum campur tangan
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tanganJimmy Mogolid
 
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"Ashraf Azim
 
4 politik dan kuasa
4  politik dan kuasa4  politik dan kuasa
4 politik dan kuasaNur Az
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3Dg Suhaili
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 

What's hot (20)

Lanun di perairan asia tenggara
Lanun di perairan asia tenggaraLanun di perairan asia tenggara
Lanun di perairan asia tenggara
 
TORT LAW - STRICT LIABILITY
TORT LAW - STRICT LIABILITYTORT LAW - STRICT LIABILITY
TORT LAW - STRICT LIABILITY
 
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKA
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKAKESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKA
KESAN PENGABAIAN PENGGUNAAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI SECARA BERETIKA
 
Kanun Prosedur Jenayah (Akta 593)
Kanun Prosedur Jenayah (Akta 593)Kanun Prosedur Jenayah (Akta 593)
Kanun Prosedur Jenayah (Akta 593)
 
Senarai istilah umum kehakiman
Senarai istilah umum kehakiman Senarai istilah umum kehakiman
Senarai istilah umum kehakiman
 
Jenayah siber
Jenayah siber Jenayah siber
Jenayah siber
 
Tadbir Urus Negara-1.pdf
Tadbir Urus Negara-1.pdfTadbir Urus Negara-1.pdf
Tadbir Urus Negara-1.pdf
 
Sosial dan budaya pa (2)
Sosial dan budaya pa (2)Sosial dan budaya pa (2)
Sosial dan budaya pa (2)
 
Sosial media presentation
Sosial media presentationSosial media presentation
Sosial media presentation
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tangan
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tanganHuraikan bentuk pentadbiran masyarakat melayu sebelum campur tangan
Huraikan bentuk pentadbiran masyarakat melayu sebelum campur tangan
 
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"
VIVA PBS SEJARAH STPM 2014 "Tun Azizan Zainul Abidin"
 
4 politik dan kuasa
4  politik dan kuasa4  politik dan kuasa
4 politik dan kuasa
 
Akta perkongsian 1961 pdf
Akta perkongsian 1961 pdfAkta perkongsian 1961 pdf
Akta perkongsian 1961 pdf
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
PBS Sejarah STPM
PBS Sejarah STPMPBS Sejarah STPM
PBS Sejarah STPM
 
Niat dalam Kontrak
Niat dalam KontrakNiat dalam Kontrak
Niat dalam Kontrak
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3
Perubahan Ekonomi di Negeri-negeri Melayu STPM Sem3
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 

Viewers also liked

Gross domestic product
Gross domestic productGross domestic product
Gross domestic productdadamimi
 
Speaking testpet
Speaking testpetSpeaking testpet
Speaking testpetVQuevedo
 
Muet paper 4
Muet paper 4Muet paper 4
Muet paper 4medelena
 
Muet Speaking Presentation
Muet Speaking PresentationMuet Speaking Presentation
Muet Speaking PresentationNur Amirah Amran
 
Muet speaking lessons set 3
Muet speaking lessons set 3Muet speaking lessons set 3
Muet speaking lessons set 3richardjessie
 
MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)Ahmad Ashaari
 
Muet speaking lesson
Muet speaking lessonMuet speaking lesson
Muet speaking lessonrichardjessie
 
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_JonesTOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_JonesJohnathan Jones
 
SPEAKING Past Year Questions
SPEAKING Past Year QuestionsSPEAKING Past Year Questions
SPEAKING Past Year Questionssveltesinchan
 
Expressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task BExpressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task BKisas Muet
 
Muet speaking lessons 2
Muet speaking lessons 2Muet speaking lessons 2
Muet speaking lessons 2richardjessie
 
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK richardjessie
 
MUET Speaking Tips and Tricks
MUET Speaking Tips and TricksMUET Speaking Tips and Tricks
MUET Speaking Tips and TricksKisas Muet
 
Measuring National Output and National Income
Measuring National Output and National IncomeMeasuring National Output and National Income
Measuring National Output and National IncomeNoel Buensuceso
 
Gross National Product
Gross National ProductGross National Product
Gross National ProductArvinda Kumar
 

Viewers also liked (20)

Gross domestic product
Gross domestic productGross domestic product
Gross domestic product
 
Speaking testpet
Speaking testpetSpeaking testpet
Speaking testpet
 
Muet paper 4
Muet paper 4Muet paper 4
Muet paper 4
 
5 speaking component (part 1) (MUET)
5 speaking component (part 1) (MUET)5 speaking component (part 1) (MUET)
5 speaking component (part 1) (MUET)
 
Muet Speaking Presentation
Muet Speaking PresentationMuet Speaking Presentation
Muet Speaking Presentation
 
Muet speaking lessons set 3
Muet speaking lessons set 3Muet speaking lessons set 3
Muet speaking lessons set 3
 
MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)
 
Muet speaking lesson
Muet speaking lessonMuet speaking lesson
Muet speaking lesson
 
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_JonesTOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
 
SPEAKING Past Year Questions
SPEAKING Past Year QuestionsSPEAKING Past Year Questions
SPEAKING Past Year Questions
 
Expressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task BExpressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task B
 
Muet speaking lessons 2
Muet speaking lessons 2Muet speaking lessons 2
Muet speaking lessons 2
 
Muet workshop 2014
Muet workshop 2014Muet workshop 2014
Muet workshop 2014
 
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
 
MUET Speaking Tips and Tricks
MUET Speaking Tips and TricksMUET Speaking Tips and Tricks
MUET Speaking Tips and Tricks
 
July-year 2012 MUET
July-year 2012 MUETJuly-year 2012 MUET
July-year 2012 MUET
 
MUET Mid years 2011
MUET Mid years 2011MUET Mid years 2011
MUET Mid years 2011
 
Gross Domestic Product
Gross Domestic ProductGross Domestic Product
Gross Domestic Product
 
Measuring National Output and National Income
Measuring National Output and National IncomeMeasuring National Output and National Income
Measuring National Output and National Income
 
Gross National Product
Gross National ProductGross National Product
Gross National Product
 

Similar to Cybercrimes

Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 

Similar to Cybercrimes (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...samuelcoulson30
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenSapana Sha
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRDelhi Call girls
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖anilsa9823
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 

Cybercrimes

  • 1. CYBER CRIMES MALAYSIAN UNIVERSITY ENGLISH TEST (MUET) UNIT ASSIGNMENT 4 MUET 800/2 SPEAKING PREPARED BY: 1. MUHAMMAD IMTIYAZ BIN MOHAMAD SOKRI 2. AHMAD LUQMAN BIN MOHD FADZIL 3. MOHD FITRI FAHMI BIN HASMADI 4. AIMAN ASYRAF BIN OTHMAN
  • 2.
  • 3.
  • 4. INTRODUCTION • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. HISTORY OF CYBER CRIME • When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. • As a result, many networks were affected; right from the military to commercial organizations. • However, with malicious software becoming ubiquitous during the same period, hacking started making networks and systems slow. • As hackers became more skillful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others
  • 6. DEFINITION OF CYBER CRIME • Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). • Additionally, cyber crime also includes traditional crimes conducted through the internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. • Involves illegal imports,malicious programs
  • 7. TYPES OF CYBER CRIMES: • HACKING • CYBER TERRORISM • EMAIL SPOOFING • PHISHING • SOFTWARE PIRACY • CHILD ABUSE  The main cause of cybercrime is accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult.  Hence, this has led to a rise in cyber crime across the world
  • 8. Types of Cyber Crime Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  • 9. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has . Cyber Terrorism- Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.
  • 10. • Child Pornography - The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate: How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 11. CATEGORIES OF CYBER CRIME • INDIVIDUAL - This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”. • PROPERTY - Steal a person’s bank details and siphon off money,misuse the credit card to make numerous purchases online,use malicious software to gain access to an organization’s website or disrupt the systems of the organization. • GOVERNMENT - Referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda
  • 12. PREVENTION OF CYBER CRIME  Anti-virus software .  Frequent password changing.  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters.
  • 13.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P(Peer-to-peer) programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke
  • 15.
  • 16.
  • 17.
  • 18.