Computer crime<br />
What ??<br />Crime that involve computer and network.<br />Use of information technology for illegal purposes that has bee...
HACKER: person who attempts to gain access to computer illegally<br />      @have high degree of computer expertise<br /> ...
Methods computer criminals use<br />bomb<br />Piggybacking<br />Salami technique<br />scavenging<br />Zapping<br />
bomb<br />A program that runs specific date and time to cause unwanted and unauthorized functions.<br />Can cause serious ...
piggybacking<br />An illicit user ‘rides’ into the system on the back of an authorized user.<br />Always log out of any sy...
Salami technique<br />An embezzlement technique where small ‘slices’ of money are funneled into accounts.<br />It involve ...
scavenging<br />Searching company trash cans and dumpsters for lists of information<br />Search for:<br />     @bank accou...
ZAPPING<br />Refers to variety of software designed to bypass all security systems.<br />
Computer crime
Upcoming SlideShare
Loading in …5
×

Computer crime

1,311 views

Published on

Published in: News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,311
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
51
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Computer crime

  1. 1. Computer crime<br />
  2. 2. What ??<br />Crime that involve computer and network.<br />Use of information technology for illegal purposes that has been access without permission.<br />
  3. 3. HACKER: person who attempts to gain access to computer illegally<br /> @have high degree of computer expertise<br /> @ social engineering<br />CRACKER: person who uses computer to engage in illegal activity.<br />
  4. 4. Methods computer criminals use<br />bomb<br />Piggybacking<br />Salami technique<br />scavenging<br />Zapping<br />
  5. 5. bomb<br />A program that runs specific date and time to cause unwanted and unauthorized functions.<br />Can cause serious damage to a system. <br />
  6. 6. piggybacking<br />An illicit user ‘rides’ into the system on the back of an authorized user.<br />Always log out of any system you log into.<br />
  7. 7. Salami technique<br />An embezzlement technique where small ‘slices’ of money are funneled into accounts.<br />It involve the theft of small amounts of assets from large number of sources without noticeable.<br />
  8. 8. scavenging<br />Searching company trash cans and dumpsters for lists of information<br />Search for:<br /> @bank account numbers<br /> @credit card numbers<br />
  9. 9. ZAPPING<br />Refers to variety of software designed to bypass all security systems.<br />

×