SlideShare a Scribd company logo
1 of 30
Module 2.2
1
Module 2.2
2
Introduction
Techniques and tools used to commit computer crimes
Categories of computer crime
Protecting yourself against cybercrime
Test and improve your knowledge
3
 Computer crime can be seen in two
ways –
where a computer system is the
target of the crime (e.g. ‘hacking’)
and where computer technology is
used to enable or commit the crime.
4
Any attempt to manipulate or ‘con’ someone into
giving out information such as a password or
account number which can be used to impersonate
them.
Software specifically designed to install itself without
the user’s knowledge and to affect or harm a
computer system . This includes viruses and spyware.
5
6
It refers to attempts from
people to con the user into
giving out personal and
confidential details such as PIN
numbers and passwords, etc. by
posing as a legitimate
organisation, usually via e-mail.
7
E-mail spoofing is the forgery
of an e-mail header so that
the e-mail appears to be from a
different origin (or person).
8
A computer worm is malware that is able
to distribute itself over a network,
normally via e-mail, without a person
having run an infected program.
9
Written to disrupt the normal
functioning of a person’s computer
without their knowledge or consent.
 Used to turn your computer into a ‘bot’
to spread malware or
 to create security loopholes for other
programs to exploit.
10
Tries to monitor and track the way you
use your computer. It then sends this
information to third parties without your
consent or knowledge.
11
Records your keystrokes as you type and
can possibly even record the movements
of your mouse and take screenshots of
what is displayed on your screen.
12
Type of malware which is a destructive
program disguised as a useful
application.
13
When a computer is ‘hacked’ so that
when the user types in a ‘valid’ URL in
their browser they are taken to another
website, which is often a replica.
14
A computer that has been compromised
(or infected) and can be controlled
remotely when it is on and connected to
the Internet.
15
Software that downloads onto your
computer and bombards your computer
with adverts that pop-up whenever you
are connected to the Internet.
! !
16
17
Cyberstalking Spam
Uploading unauthorised pictures on
the Web
Cyberbullying
18
business
cyber
attacks
website
cyber
attacks
cyberterrorism
denial of
service
attacks
19
Bandwidth
Identity
Processing time and power
Money
Copyrighted material
Data/Intellectual property
20
The criminal either has to:
 obtain essential information, such as a
user name and password, in order to access a
secure system
 get physical access to a computer so that
data can be downloaded directly onto
portable media.
21
22
 Assume nothing
 Believe no one
 Check everything
A B
C
23
Anti-virus software
Computer programs that scan computer files for
viruses and eliminate them.
24
Firewall software
Software that allows you to control which
programs can access the Internet and protects your
computer or network from unauthorised access.
25
Anti-spyware software
Anti-spyware software detects spyware that has
been installed on a computer.
26
 Be careful when installing ‘free’
software .
 Have good password policies.
 Stay informed.
27
 Don’t give out personal information.
 Don’t click on links in pop-ups.
 Don’t open attachments or programs
unless you are sure of what they are.
 Don’t be gullible.
28

29
30

More Related Content

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Spyware
SpywareSpyware
Spyware
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 

Similar to Techniques and Categories of Computer Crime

Similar to Techniques and Categories of Computer Crime (20)

2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
cyber crime
 cyber crime cyber crime
cyber crime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 

More from QondileRamokgadi

7 1 information management
7 1 information management7 1 information management
7 1 information managementQondileRamokgadi
 
4 4 making changes to graphs
4 4 making changes to graphs4 4 making changes to graphs
4 4 making changes to graphsQondileRamokgadi
 
4 2 decisions and functions
4 2 decisions and functions4 2 decisions and functions
4 2 decisions and functionsQondileRamokgadi
 
3 3 integrate, check and share documents
3 3 integrate, check and share documents3 3 integrate, check and share documents
3 3 integrate, check and share documentsQondileRamokgadi
 
3 2 working with long documents
3 2 working with long documents3 2 working with long documents
3 2 working with long documentsQondileRamokgadi
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connectionsQondileRamokgadi
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer managementQondileRamokgadi
 
1 3 hardware recommendations
1 3 hardware recommendations1 3 hardware recommendations
1 3 hardware recommendationsQondileRamokgadi
 

More from QondileRamokgadi (10)

My pln
My plnMy pln
My pln
 
7 1 information management
7 1 information management7 1 information management
7 1 information management
 
4 4 making changes to graphs
4 4 making changes to graphs4 4 making changes to graphs
4 4 making changes to graphs
 
4 2 decisions and functions
4 2 decisions and functions4 2 decisions and functions
4 2 decisions and functions
 
3 3 integrate, check and share documents
3 3 integrate, check and share documents3 3 integrate, check and share documents
3 3 integrate, check and share documents
 
3 2 working with long documents
3 2 working with long documents3 2 working with long documents
3 2 working with long documents
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connections
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
1 3 hardware recommendations
1 3 hardware recommendations1 3 hardware recommendations
1 3 hardware recommendations
 
1 2 hardware
1 2 hardware1 2 hardware
1 2 hardware
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Techniques and Categories of Computer Crime

  • 3. Introduction Techniques and tools used to commit computer crimes Categories of computer crime Protecting yourself against cybercrime Test and improve your knowledge 3
  • 4.  Computer crime can be seen in two ways – where a computer system is the target of the crime (e.g. ‘hacking’) and where computer technology is used to enable or commit the crime. 4
  • 5. Any attempt to manipulate or ‘con’ someone into giving out information such as a password or account number which can be used to impersonate them. Software specifically designed to install itself without the user’s knowledge and to affect or harm a computer system . This includes viruses and spyware. 5
  • 6. 6
  • 7. It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e-mail. 7
  • 8. E-mail spoofing is the forgery of an e-mail header so that the e-mail appears to be from a different origin (or person). 8
  • 9. A computer worm is malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program. 9
  • 10. Written to disrupt the normal functioning of a person’s computer without their knowledge or consent.  Used to turn your computer into a ‘bot’ to spread malware or  to create security loopholes for other programs to exploit. 10
  • 11. Tries to monitor and track the way you use your computer. It then sends this information to third parties without your consent or knowledge. 11
  • 12. Records your keystrokes as you type and can possibly even record the movements of your mouse and take screenshots of what is displayed on your screen. 12
  • 13. Type of malware which is a destructive program disguised as a useful application. 13
  • 14. When a computer is ‘hacked’ so that when the user types in a ‘valid’ URL in their browser they are taken to another website, which is often a replica. 14
  • 15. A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the Internet. 15
  • 16. Software that downloads onto your computer and bombards your computer with adverts that pop-up whenever you are connected to the Internet. ! ! 16
  • 17. 17
  • 18. Cyberstalking Spam Uploading unauthorised pictures on the Web Cyberbullying 18
  • 20. Bandwidth Identity Processing time and power Money Copyrighted material Data/Intellectual property 20
  • 21. The criminal either has to:  obtain essential information, such as a user name and password, in order to access a secure system  get physical access to a computer so that data can be downloaded directly onto portable media. 21
  • 22. 22
  • 23.  Assume nothing  Believe no one  Check everything A B C 23
  • 24. Anti-virus software Computer programs that scan computer files for viruses and eliminate them. 24
  • 25. Firewall software Software that allows you to control which programs can access the Internet and protects your computer or network from unauthorised access. 25
  • 26. Anti-spyware software Anti-spyware software detects spyware that has been installed on a computer. 26
  • 27.  Be careful when installing ‘free’ software .  Have good password policies.  Stay informed. 27
  • 28.  Don’t give out personal information.  Don’t click on links in pop-ups.  Don’t open attachments or programs unless you are sure of what they are.  Don’t be gullible. 28
  • 30. 30