SlideShare a Scribd company logo
1 of 4
Computer
crime
Computer crime
 Computer crime refers to any crime that
involves a computer and a network
 .The computer may have been used in the
commission of a crime, or it may be the
target.
 Netcrime refers to criminal exploitation of
the Internet.

Classification
 Computer crime encompasses a broad range of activities.
Generally, however, it may be divided into two categories:
 (1) crimes that target computers directly;
 (2) crimes facilitated by computer networks or devices, the
primary target of which is independent of the computer
network or device.
 Crimes that primarily target computer networks or devices
include:
 Computer viruses
 Denial-of-service attacks
 Malware (malicious code)
RAHIMOON
Sikandar-e-Azam

More Related Content

What's hot

External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system Kushagr sharma
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A Nnasya
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)YUSRA FERNANDO
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 

What's hot (18)

External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Computer
ComputerComputer
Computer
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 

Viewers also liked

Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Viewers also liked (9)

Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

CYBER CRIME

  • 2. Computer crime  Computer crime refers to any crime that involves a computer and a network  .The computer may have been used in the commission of a crime, or it may be the target.  Netcrime refers to criminal exploitation of the Internet. 
  • 3. Classification  Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories:  (1) crimes that target computers directly;  (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.  Crimes that primarily target computer networks or devices include:  Computer viruses  Denial-of-service attacks  Malware (malicious code)