SlideShare a Scribd company logo
Computer Crime and Safety
Measure
1
Purushottam Dahal
BIM,HSM
www.purushottamdahal.com.np
Content
1. Computer Crime
2. Software Piracy
3. Anti Piracy
4. Computer Virus, Worm, Spyware
5. Ethical Issues in Computer
6. Cyber Law
7. Network Security
8. Data and message security
5/23/2016
2
Computer Crime
 Computer crime describes a very broad category of offenses.
 Some of them are the same as non-computer offenses, such as larceny or fraud, except that a computer
or the Internet is used in the commission of the crime.
 Others, like many forms of hacking, are uniquely related to computers.
5/23/2016
3
Computer crime laws in many states prohibit a person from performing certain acts without authorization,
including:
 Improperly accessing a computer, system, or network;
 Modifying, damaging, using, disclosing, copying, or taking programs or data;
 Introducing a virus or other contaminant into a computer system;
 Using a computer in a scheme to defraud;
 Interfering with someone else's computer access or use;
 Using encryption in aid of a crime;
 Falsifying e-mail source information; and
 Stealing an information service from a provider.
5/23/2016
4
Software Piracy
 The unauthorized copying of software. Most retail programs are licensed for use at just one computer site
or for use by only one user at any time.
 By buying the software, you become a licensed user rather than an owner. You are allowed to make
copies of the program for backup purposes, but it is against the law to give copies to friends and
colleagues.
 Software piracy is all but impossible to stop, although software companies are launching more and more
lawsuits against major infractors.
 Originally, software companies tried to stop software piracy by copy-protecting their software. This
strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most
software now requires some sort of registration, which may discourage would-be pirates, but doesn't
really stop software piracy.
5/23/2016
5
Anti Piracy
 Designed to prevent the unauthorized use or reproduction of copyright material.
5/23/2016
6
Computer virus
 A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other
programs by modifying them.
 Infecting computer programs can include as well, data files, or the boot sector of the hard drive.
5/23/2016
7
Worm
 A computer worm is a standalone malware computer program that replicates itself in order to spread to
other computers.
 Often, it uses a computer network to spread itself, relying on security failures on the target computer to
access it.
 Unlike a computer virus, it does not need to attach itself to an existing program.
5/23/2016
8
Spyware
 Spyware is software that aims to gather information about a person or organization without their
knowledge and that may send such information to another entity without the consumer's consent, or that
asserts control over a computer without the consumer's knowledge.
 "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies.
 Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web
and serving up pop-up ads to Internet users.
5/23/2016
9
Cyber law
 Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.
 It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many
areas of law and regulation.
5/23/2016
10
Network security
 Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
 Network security involves the authorization of access to data in a network, which is controlled by the
network administrator.
5/23/2016
11
5/23/2016
12

More Related Content

What's hot

DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
unnecessary34
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
Mohd Arif
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
iYogi
 
spyware
spyware spyware
spyware
maaza mohammed
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Malware
MalwareMalware
Malware
galaxy201
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
Matthew J McMahon
 
Spyware
SpywareSpyware
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
Manage IT Africa
 
Spyware, spying software, computer spying
Spyware, spying software, computer spying Spyware, spying software, computer spying
Spyware, spying software, computer spying
Ashish kumar Bhardwaj
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
Seqrite
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
spyware
spyware spyware
spyware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Malware
MalwareMalware
Malware
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
 
Spyware
SpywareSpyware
Spyware
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Spyware
SpywareSpyware
Spyware
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
 
Spyware, spying software, computer spying
Spyware, spying software, computer spying Spyware, spying software, computer spying
Spyware, spying software, computer spying
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 

Viewers also liked

Starting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of TechnologyStarting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of Technology
ejl2
 
Safety In Using Computer
Safety In  Using  ComputerSafety In  Using  Computer
Safety In Using ComputerKMon Vee
 
(C) Etiquette @ Work
(C)   Etiquette @ Work(C)   Etiquette @ Work
(C) Etiquette @ Work
Amit Rastogi
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
haider ali
 
Professional Etiquette And Do Donts
Professional Etiquette And Do DontsProfessional Etiquette And Do Donts
Professional Etiquette And Do DontsSouvik Santra
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
Rachel Weber
 

Viewers also liked (7)

Starting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of TechnologyStarting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of Technology
 
Safety In Using Computer
Safety In  Using  ComputerSafety In  Using  Computer
Safety In Using Computer
 
(C) Etiquette @ Work
(C)   Etiquette @ Work(C)   Etiquette @ Work
(C) Etiquette @ Work
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Professional Etiquette And Do Donts
Professional Etiquette And Do DontsProfessional Etiquette And Do Donts
Professional Etiquette And Do Donts
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 

Similar to Computer Crime and Safety Measure

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
ChaitanyaMundra2
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
Aamlan Saswat Mishra
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
DarshanPadmapriya
 
Internet security
Internet securityInternet security
Internet securityat1211
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
lobnaqassem2
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
jnallnmnl
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

Similar to Computer Crime and Safety Measure (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Network security
Network securityNetwork security
Network security
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Computer security
Computer securityComputer security
Computer security
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Internet security
Internet securityInternet security
Internet security
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Hamza
HamzaHamza
Hamza
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 

More from Purushottam Dahal

Australia's Successful Industries
Australia's Successful IndustriesAustralia's Successful Industries
Australia's Successful Industries
Purushottam Dahal
 
Data Processing and Database
Data Processing and DatabaseData Processing and Database
Data Processing and Database
Purushottam Dahal
 
Network and Communication
Network and CommunicationNetwork and Communication
Network and Communication
Purushottam Dahal
 
Multimedia
MultimediaMultimedia
Multimedia
Purushottam Dahal
 
Computer system Development
Computer system Development Computer system Development
Computer system Development
Purushottam Dahal
 
Introduction to the Internet
Introduction to the Internet Introduction to the Internet
Introduction to the Internet
Purushottam Dahal
 
Programming Language
Programming LanguageProgramming Language
Programming Language
Purushottam Dahal
 
Introduction to computer System
Introduction to computer SystemIntroduction to computer System
Introduction to computer System
Purushottam Dahal
 
Ex net
Ex netEx net
Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.
Purushottam Dahal
 
Administering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumesAdministering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumes
Purushottam Dahal
 
WordPress Workshop
WordPress WorkshopWordPress Workshop
WordPress Workshop
Purushottam Dahal
 
Media Concept and classification of Media
Media Concept and classification of MediaMedia Concept and classification of Media
Media Concept and classification of Media
Purushottam Dahal
 
Employees grievances and disciplines
Employees grievances and disciplinesEmployees grievances and disciplines
Employees grievances and disciplines
Purushottam Dahal
 
WordPress
WordPressWordPress
VoIP
VoIPVoIP

More from Purushottam Dahal (20)

Australia's Successful Industries
Australia's Successful IndustriesAustralia's Successful Industries
Australia's Successful Industries
 
Data Processing and Database
Data Processing and DatabaseData Processing and Database
Data Processing and Database
 
Network and Communication
Network and CommunicationNetwork and Communication
Network and Communication
 
Multimedia
MultimediaMultimedia
Multimedia
 
Computer system Development
Computer system Development Computer system Development
Computer system Development
 
Introduction to the Internet
Introduction to the Internet Introduction to the Internet
Introduction to the Internet
 
Programming Language
Programming LanguageProgramming Language
Programming Language
 
Introduction to computer System
Introduction to computer SystemIntroduction to computer System
Introduction to computer System
 
Ex net
Ex netEx net
Ex net
 
Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.
 
Administering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumesAdministering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumes
 
WordPress Workshop
WordPress WorkshopWordPress Workshop
WordPress Workshop
 
Media Concept and classification of Media
Media Concept and classification of MediaMedia Concept and classification of Media
Media Concept and classification of Media
 
Employees grievances and disciplines
Employees grievances and disciplinesEmployees grievances and disciplines
Employees grievances and disciplines
 
WordPress
WordPressWordPress
WordPress
 
VoIP
VoIPVoIP
VoIP
 
Hetauda App Introduction
Hetauda App IntroductionHetauda App Introduction
Hetauda App Introduction
 
Mozilla nepal
Mozilla nepalMozilla nepal
Mozilla nepal
 
Machine learning
Machine learningMachine learning
Machine learning
 
Google page ranking
Google page rankingGoogle page ranking
Google page ranking
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Computer Crime and Safety Measure

  • 1. Computer Crime and Safety Measure 1 Purushottam Dahal BIM,HSM www.purushottamdahal.com.np
  • 2. Content 1. Computer Crime 2. Software Piracy 3. Anti Piracy 4. Computer Virus, Worm, Spyware 5. Ethical Issues in Computer 6. Cyber Law 7. Network Security 8. Data and message security 5/23/2016 2
  • 3. Computer Crime  Computer crime describes a very broad category of offenses.  Some of them are the same as non-computer offenses, such as larceny or fraud, except that a computer or the Internet is used in the commission of the crime.  Others, like many forms of hacking, are uniquely related to computers. 5/23/2016 3
  • 4. Computer crime laws in many states prohibit a person from performing certain acts without authorization, including:  Improperly accessing a computer, system, or network;  Modifying, damaging, using, disclosing, copying, or taking programs or data;  Introducing a virus or other contaminant into a computer system;  Using a computer in a scheme to defraud;  Interfering with someone else's computer access or use;  Using encryption in aid of a crime;  Falsifying e-mail source information; and  Stealing an information service from a provider. 5/23/2016 4
  • 5. Software Piracy  The unauthorized copying of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time.  By buying the software, you become a licensed user rather than an owner. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.  Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors.  Originally, software companies tried to stop software piracy by copy-protecting their software. This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn't really stop software piracy. 5/23/2016 5
  • 6. Anti Piracy  Designed to prevent the unauthorized use or reproduction of copyright material. 5/23/2016 6
  • 7. Computer virus  A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them.  Infecting computer programs can include as well, data files, or the boot sector of the hard drive. 5/23/2016 7
  • 8. Worm  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.  Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.  Unlike a computer virus, it does not need to attach itself to an existing program. 5/23/2016 8
  • 9. Spyware  Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.  "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies.  Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. 5/23/2016 9
  • 10. Cyber law  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.  It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. 5/23/2016 10
  • 11. Network security  Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Network security involves the authorization of access to data in a network, which is controlled by the network administrator. 5/23/2016 11