SlideShare a Scribd company logo
1 of 8
Asma Abdulla
H00126596
AT3
 Is normally an act of stealing or
criminal strength at sea. The term
can include acts committed on
land, in the air, or in other main
bodies of water or on a beach.
 (Malware) Is any software that
gives partial to full control of your
computer to do whatever the
malware creator wants.
 Is the stealing of another
language, thoughts, ideas, or
words," and the representation of
them as one's own original work.
 Is the act of trying to get
information such as
usernames, passwords, and credit
card details (and
sometimes, indirectly, money) by
hidden as a trustworthy object in
an electronic communication.
 Is the creation of Internet Protocol
with a copied source IP
address, with the purpose of
hiding the identity of the sender.
 Is the use of the Internet or other
electronic means to follow or
annoy an individual, a group of
individuals, or an organization.
 Any available or broadcast content
(such as
articles, photographs, films, or
websites) that is likely to be hurtful
or disagreeable to some or most
people.

More Related Content

What's hot

Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 
Copyright Crash Course 1st revised ppt 6340.64 Sonia Aldape
Copyright Crash Course 1st revised ppt 6340.64 Sonia AldapeCopyright Crash Course 1st revised ppt 6340.64 Sonia Aldape
Copyright Crash Course 1st revised ppt 6340.64 Sonia Aldapesoniaaldape
 

What's hot (6)

Hackers final
Hackers finalHackers final
Hackers final
 
Hackers
HackersHackers
Hackers
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Hackers
HackersHackers
Hackers
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Copyright Crash Course 1st revised ppt 6340.64 Sonia Aldape
Copyright Crash Course 1st revised ppt 6340.64 Sonia AldapeCopyright Crash Course 1st revised ppt 6340.64 Sonia Aldape
Copyright Crash Course 1st revised ppt 6340.64 Sonia Aldape
 

Viewers also liked (13)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cybercrimes

Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
Digitalcitizenproject
DigitalcitizenprojectDigitalcitizenproject
DigitalcitizenprojectJennMinor
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the LawSyed Zaid Irshad
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

Similar to Cybercrimes (13)

Presentation1
Presentation1Presentation1
Presentation1
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Digitalcitizenproject
DigitalcitizenprojectDigitalcitizenproject
Digitalcitizenproject
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Virus
VirusVirus
Virus
 

Cybercrimes

  • 2.  Is normally an act of stealing or criminal strength at sea. The term can include acts committed on land, in the air, or in other main bodies of water or on a beach.
  • 3.  (Malware) Is any software that gives partial to full control of your computer to do whatever the malware creator wants.
  • 4.  Is the stealing of another language, thoughts, ideas, or words," and the representation of them as one's own original work.
  • 5.  Is the act of trying to get information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by hidden as a trustworthy object in an electronic communication.
  • 6.  Is the creation of Internet Protocol with a copied source IP address, with the purpose of hiding the identity of the sender.
  • 7.  Is the use of the Internet or other electronic means to follow or annoy an individual, a group of individuals, or an organization.
  • 8.  Any available or broadcast content (such as articles, photographs, films, or websites) that is likely to be hurtful or disagreeable to some or most people.