Cyber Crimes

18,036 views

Published on

cyber crimes, cyber terrorism, cyber attack, hacking, phishing.

Published in: Technology
0 Comments
15 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
18,036
On SlideShare
0
From Embeds
0
Number of Embeds
34
Actions
Shares
0
Downloads
2,079
Comments
0
Likes
15
Embeds 0
No embeds

No notes for slide

Cyber Crimes

  1. 2. CYBER CRIMES Cyber Crimes use computers and networks for criminal activities. Computers can be used for committing a crime in one of the following three ways 1. As a tool 2. As a target 3. Both as a tool and a target
  2. 3. CYBER CRIMES A partial list of cyber crimes are as follows; 1. Hacking of computer systems and networks 2. Cyber pornography involving production and distribution of pornographic material, including child pornography 3. Financial crimes such as siphoning of money from banks, credit card frauds, money laundering
  3. 4. CYBER CRIMES 4. Online Gambling 5. Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations 6. Harassments such as cyber stalking, cyber defamation, indecent and abusing mails 7. Cyber frauds such as forgery of documents including currency and any other documents
  4. 5. CYBER CRIMES <ul><li>Launching of virus, worms and Trojans </li></ul><ul><li>9. Denial-of-service attacks </li></ul><ul><li>10. Cyber attacks and cyber terrorism </li></ul><ul><li>11. Economic espionage </li></ul><ul><li>12. Consumer harassment and consumer </li></ul><ul><li>protection </li></ul>
  5. 6. CYBER CRIMES 13. Privacy of citizens 14. Sale of illegal articles such as narcotics, weapons, wildlife, etc Cyber crimes that can generally occur within organizations are as follows;
  6. 7. CYBER CRIMES 1. E-mail abuse 2. Spam mails 3. Cyber defamation 4. Theft of source code 5. Exchange of business secrets and documents
  7. 8. CYBER CRIMES 6. Insider attacks on personal database 7. Use of office computer for running other business 8. Transmission and viewing of pornographic materials 9. External cyber attacks on an organization resulting in denial-of-service 10. Information espionage

×