SlideShare a Scribd company logo
1 of 12
Download to read offline
CYBERCRIME LAWS
• INSTRUCTOR  End. Ibraheem Al- Odaini
• TRAINER’S NAME  Asim Aldaheri
CYBERCRIME LAWS
Computer crime is a top concern of the legal
community.
And despite greater consumer awareness and
advanced countermeasures, cybercrime
continues to climb. Everyday, smarter criminals
find creative ways to program disruptive viruses,
steal intellectual property, commit identity theft,
access financial information, and shut down
corporate computer systems.
COMPUTER CRIME
Computer crime involves both hardware and software,
cybercrime in three ways.
1. Criminals target the computer. These crimes could include theft of data, viruses,
or hardware theft.
2. Computers act as weapons to commit crimes. Criminals use computers and
technology to commit many kinds of traditional crime.
3. Computers also act as legal accessories, storing incriminating information.
 MOBILE CYBERCRIMES AFFECT 80 PERCENT OF MEN
BETWEEN THE AGES OF 18 AND 31.
 ABOUT 14 ADULTS BECOME NEW CYBERCRIME VICTIMS
EVERY SECOND.
 BRILLIANT COMPUTER SKILLS NO LONGER CHARACTERIZE
COMPUTER CRIMINALS. CRIMINALS AND CHILDREN CAN
DOWNLOAD HACKING TOOLS AND USE THEM EASILY.
IDENTIFYING TYPES OF COMPUTER
CRIME
Cybercrime refers to any crime involving computers, mobile devices
or Internet services. The FBI investigates computer crimes, which
often cross borders and therefore pose jurisdictional problems for law
enforcement officers. Crimes fall into two general categories:
1. crimes made possible by computer networks and crimes that target
computers directly.
2. Crimes that use networks include the following offenses.
• Phishing scams
• Malware and viruses
• Denial of service for malicious mischief
• Identity theft and fraud
• Information theft
• Cyberstalking
Computer crimes cross international borders and often involve issues of
free speech, obscenity, and libelous or slanderous postings. More than
25 jurisdictions place limits on speech and ban certain types of
subversive, obscene or inflammatory material.
COMPUTER FRAUD
• Stealing computer information, changing, and deleting it qualify
as fraud.
• Fraudulent activity includes altering computer code for illegal
purposes.
• Criminal fraud also includes misusing software or changing
how it works.C
• omputer criminals target people online for various financial
scams, which have become so prevalent that many of these
crimes go unreported.
IDENTITY THEFT
People steal personal information in many ingenious
ways and use this information to apply for credit,
jobs, or get unauthorized access to personal
accounts or information. Common methods of
stealing information include the following techniques.
IDENTITY THEFT
• Phishing scams use emails, spam, phone calls and other communications
pretending to represent banks, utility companies or potential employers and ask
for personal information.
• Dumpster diving refers to criminals going through trash to find old bills and
personal communications.S
• kimming uses high-tech devices that steal credit information from debit and credit
cards when criminals swipe them.
• Criminals use a simple, low-tech method to divert mail—they simply fill out a
change of address card and send it to the post office to intercept communications.
• Simple theft involves stealing wallets or purses to get personal information.
• Pretexting offers prizes or rewards on mobile phones, but the hook always
requires confirming personal information
CYBERCRIME AND
PUNISHMENT
Cybercrimes run the gamut—from student mischief to international terrorism.
The increasingly severe penalties for these types of crimes serve as deterrents
as more people become aware of the consequences they might face.
Cybercrime causes major losses of time, money, and good reputations, and
judges and prosecutors have no choice but to treat these crimes with utmost
severity.
Substantive laws include crimes such as online gambling, child pornography,
theft of intellectual property, fraud, and identity theft.
• ‫المرجع‬:
www.aaronkellylaw.com

More Related Content

What's hot

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
Yash
 

What's hot (20)

Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber security
Cyber security Cyber security
Cyber security
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cybercrime by Suphiyaan
Cybercrime by SuphiyaanCybercrime by Suphiyaan
Cybercrime by Suphiyaan
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 

Similar to Cyber laws

Similar to Cyber laws (20)

Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptx
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 

Cyber laws

  • 1. CYBERCRIME LAWS • INSTRUCTOR End. Ibraheem Al- Odaini • TRAINER’S NAME Asim Aldaheri
  • 3. Computer crime is a top concern of the legal community. And despite greater consumer awareness and advanced countermeasures, cybercrime continues to climb. Everyday, smarter criminals find creative ways to program disruptive viruses, steal intellectual property, commit identity theft, access financial information, and shut down corporate computer systems.
  • 4. COMPUTER CRIME Computer crime involves both hardware and software, cybercrime in three ways. 1. Criminals target the computer. These crimes could include theft of data, viruses, or hardware theft. 2. Computers act as weapons to commit crimes. Criminals use computers and technology to commit many kinds of traditional crime. 3. Computers also act as legal accessories, storing incriminating information.
  • 5.  MOBILE CYBERCRIMES AFFECT 80 PERCENT OF MEN BETWEEN THE AGES OF 18 AND 31.  ABOUT 14 ADULTS BECOME NEW CYBERCRIME VICTIMS EVERY SECOND.  BRILLIANT COMPUTER SKILLS NO LONGER CHARACTERIZE COMPUTER CRIMINALS. CRIMINALS AND CHILDREN CAN DOWNLOAD HACKING TOOLS AND USE THEM EASILY.
  • 6. IDENTIFYING TYPES OF COMPUTER CRIME Cybercrime refers to any crime involving computers, mobile devices or Internet services. The FBI investigates computer crimes, which often cross borders and therefore pose jurisdictional problems for law enforcement officers. Crimes fall into two general categories: 1. crimes made possible by computer networks and crimes that target computers directly. 2. Crimes that use networks include the following offenses.
  • 7. • Phishing scams • Malware and viruses • Denial of service for malicious mischief • Identity theft and fraud • Information theft • Cyberstalking Computer crimes cross international borders and often involve issues of free speech, obscenity, and libelous or slanderous postings. More than 25 jurisdictions place limits on speech and ban certain types of subversive, obscene or inflammatory material.
  • 8. COMPUTER FRAUD • Stealing computer information, changing, and deleting it qualify as fraud. • Fraudulent activity includes altering computer code for illegal purposes. • Criminal fraud also includes misusing software or changing how it works.C • omputer criminals target people online for various financial scams, which have become so prevalent that many of these crimes go unreported.
  • 9. IDENTITY THEFT People steal personal information in many ingenious ways and use this information to apply for credit, jobs, or get unauthorized access to personal accounts or information. Common methods of stealing information include the following techniques.
  • 10. IDENTITY THEFT • Phishing scams use emails, spam, phone calls and other communications pretending to represent banks, utility companies or potential employers and ask for personal information. • Dumpster diving refers to criminals going through trash to find old bills and personal communications.S • kimming uses high-tech devices that steal credit information from debit and credit cards when criminals swipe them. • Criminals use a simple, low-tech method to divert mail—they simply fill out a change of address card and send it to the post office to intercept communications. • Simple theft involves stealing wallets or purses to get personal information. • Pretexting offers prizes or rewards on mobile phones, but the hook always requires confirming personal information
  • 11. CYBERCRIME AND PUNISHMENT Cybercrimes run the gamut—from student mischief to international terrorism. The increasingly severe penalties for these types of crimes serve as deterrents as more people become aware of the consequences they might face. Cybercrime causes major losses of time, money, and good reputations, and judges and prosecutors have no choice but to treat these crimes with utmost severity. Substantive laws include crimes such as online gambling, child pornography, theft of intellectual property, fraud, and identity theft.