4. ๏Stealing a personโs identity
๏Making Money
๏Harassing Someone
๏Getting Secret Records or Passwords
๏Assessing someone personal Data
5. ๏Computer as a ; using a Computer to
commit real World Crime.
๏Computer as a ; using a Computer to
attack on other Computer
6. ๏ Against Person
i. Hacking
ii. Harassment
๏Against Property
i. Intellectual property crimes
ii. Hacking Computer System
๏Against Government
i. Cyber Terrorism
ii. Information
8. ๏ Crime wherein a personโs computer is broken
into so that his personal or sensitive information
can be accessed
๏Also known as
๏Government websites are the hot targets of
hackers.
9. ๏Damaging or destroying the data rather than
stealing or misusing
๏Transmitting Viruses; These are the programs
that attach themselves to a file and then
circulate from one computer to other.
10. ๏The politically motivated use of computers
and information technology to cause severe
disruption or widespread fear.
๏Using Computer and Network to spread fear in
among civilians.
11. ๏ Illegal copying, distribution, or use
of software
๏According to the Business Software Alliance
(BSA), about 36% of all software in current use
is stolen.
๏ Built to protect the privacy of its users
15. ๏This Security will defend us from critical
attacks
๏Helps us to browse the safe website
๏Secure all the incoming and outgoing data on
our computer