SlideShare a Scribd company logo
SOSIO INFORMATIKA
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id
CONTACT ME
2
Computer Crime
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Ethical and Social...J.M.Kizza 4
Objectives Learn
the history and examples of computer crimes, their types, costs on
society, and strategies of detection and prevention.
What Is Computer Crime?
• Criminal activity that is committed using computers, or that
targets computers, or both
• Many different types of offenses
• Different types of perpetrators, different motivations
• One of the biggest criminal threats facing society today
What Are the Crimes?
• Breaches of Physical Security
• Disruption of service
• Interception of communication
What Are the Crimes?
• Breaches of Personnel Security
• Masquerading
• Social engineering
What Are the Crimes?
• Breaches of Communications/Data Security
• Data attacks (e.g. data theft)
• Software attacks (e.g. malware)
Who Are the Perpetrators?
• Crackers
• “Professional” Criminals
• Vandals
What Is the Extent of the Problem?
What Is the Extent of the Problem?
• CSI/FBI Computer Crime and Security Survey
• It's a big problem, but it's getting better
• Hard to tell
• DoD: As few as 10% of cases are reported
Computer Crime Prvention
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Computer Crime Prevention
• Do not connect to anything
• Hardware or Physical Level
• Software Level
• Laws and Lawsuits
Major Threats
• Viruses
• Hackers
• Spyware/Spam
• Copyright Infringement
• Theft
Methods of Prevention
• Hardware
• Locks
• Firewalls
• Hardware based vs. Software based
• Filtering
• Allow everything vs. Deny everything.
Methods of Prevention
• Software
• Data Encryption
• Firewalls
• Wireless
• Antivirus
• On-access Detection vs. On-demand Detection
• Spyware/Spam
• Programs available online
Methods of Prevention
• Laws
• “Can Spam” Act & Spy Act
• Computer Fraud and Abuse Act
• “knowingly causes the transmission of a program, information, code, or command, and
as a result of such conduct, intentionally causes damage without authorization, to a
protected computer “
• Copyright Infringement (Piracy)
• RIAA & MPAA
• Software Companies
Total Prevention - Possible?
• Technology Growing Too Fast
• Multi-layered prevention
• Wireless
Thank You ..
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
YUSRA FERNANDO, S.KOM., M.KOM
20192019

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Cyber Crime
Cyber CrimeCyber Crime
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
Prabesh Shrestha
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
Segun Ebenezer Olaniyan
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
Mohamad Fathi
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
Jayed Hossain Jibon
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
Jacqueline Fick
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
manisha9kathuria
 

What's hot (18)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Chp 9 lect - computer crimes surveys (shared)

Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
chiragsahoo5
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss647822
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
Dr. C.V. Suresh Babu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
NavanathDarwante1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JASJIT SINGH
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
 
Cyber Security
Cyber SecurityCyber Security
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
cyber crime
 cyber crime cyber crime
cyber crime
sonalpandey11
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 

Similar to Chp 9 lect - computer crimes surveys (shared) (20)

Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 

More from YUSRA FERNANDO

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
YUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
YUSRA FERNANDO
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
YUSRA FERNANDO
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
YUSRA FERNANDO
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
YUSRA FERNANDO
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
YUSRA FERNANDO
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
YUSRA FERNANDO
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
YUSRA FERNANDO
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
YUSRA FERNANDO
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
YUSRA FERNANDO
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
YUSRA FERNANDO
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
YUSRA FERNANDO
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
YUSRA FERNANDO
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
YUSRA FERNANDO
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
YUSRA FERNANDO
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
YUSRA FERNANDO
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
YUSRA FERNANDO
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 

More from YUSRA FERNANDO (20)

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Chp 9 lect - computer crimes surveys (shared)

  • 1. SOSIO INFORMATIKA UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 2. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id CONTACT ME 2
  • 3. Computer Crime UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 4. Ethical and Social...J.M.Kizza 4 Objectives Learn the history and examples of computer crimes, their types, costs on society, and strategies of detection and prevention.
  • 5. What Is Computer Crime? • Criminal activity that is committed using computers, or that targets computers, or both • Many different types of offenses • Different types of perpetrators, different motivations • One of the biggest criminal threats facing society today
  • 6. What Are the Crimes? • Breaches of Physical Security • Disruption of service • Interception of communication
  • 7. What Are the Crimes? • Breaches of Personnel Security • Masquerading • Social engineering
  • 8. What Are the Crimes? • Breaches of Communications/Data Security • Data attacks (e.g. data theft) • Software attacks (e.g. malware)
  • 9. Who Are the Perpetrators? • Crackers • “Professional” Criminals • Vandals
  • 10. What Is the Extent of the Problem?
  • 11. What Is the Extent of the Problem? • CSI/FBI Computer Crime and Security Survey • It's a big problem, but it's getting better • Hard to tell • DoD: As few as 10% of cases are reported
  • 12. Computer Crime Prvention UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 13. Computer Crime Prevention • Do not connect to anything • Hardware or Physical Level • Software Level • Laws and Lawsuits
  • 14. Major Threats • Viruses • Hackers • Spyware/Spam • Copyright Infringement • Theft
  • 15. Methods of Prevention • Hardware • Locks • Firewalls • Hardware based vs. Software based • Filtering • Allow everything vs. Deny everything.
  • 16. Methods of Prevention • Software • Data Encryption • Firewalls • Wireless • Antivirus • On-access Detection vs. On-demand Detection • Spyware/Spam • Programs available online
  • 17. Methods of Prevention • Laws • “Can Spam” Act & Spy Act • Computer Fraud and Abuse Act • “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer “ • Copyright Infringement (Piracy) • RIAA & MPAA • Software Companies
  • 18. Total Prevention - Possible? • Technology Growing Too Fast • Multi-layered prevention • Wireless
  • 19. Thank You .. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER YUSRA FERNANDO, S.KOM., M.KOM 20192019