SlideShare a Scribd company logo
Research Assignment
Communication Technologies & Change
Sarah Johnson – u3025130
Tutorial Group #4
Cybercrime is defined as:
‘computer-mediated activities which are either
illegal or considered illicit by certain parties and
which can be conducted through global electronic
networks’
(Yar, 2006, p9)
 Cracking – accessing computer systems without
authority to commit a crime. Includes deliberately corrupting or
erasing information within computer systems, defacing websites, and
running copy-protected programs without a password or valid license
string
 Piracy – copying protected software without
authorisation
 Phreaking – manipulating a phone system using a
computer or other device to obtain free telephone calls
or charge calls to another account
 Cyberstalking – using a computer to harass and
terrorise selected human and institutional targets,
causing them to fear injury or harm
 Cyberpornography – producing and/or
distributing pornography using a computer
 Cyberterrorism – unlawful attacks and threats of
attack by terrorists against computers, networks, and
the information stored therein to intimidate or coerce a
government or its people to further the perpetrator’s
political or social objectives
 Hacker unions or crews (domestic and foreign)
 Organised crime
 Foreign Intelligence Services
 Botnet operators
 Random individuals looking to take advantage
of readily available black (underground)
technologies
(Fujitsu, 2009, p4)
 In 2008, security vendor AVG conducted a survey into global
cybercrime and found that Australia has the highest incidence of
cyber crime in the world with more than 39 per cent of
Australian’s having been the victim of cyber crime
(Fujitsu, 2009, p3)
 The 2005 AusCERT Australian Computer Crime and Security Survey
found that in total, $16.9million was lost by 110 of the Australian
organisations surveyed (Arias, 2007)
 A recent report by the Australian Institute of Criminology found
that cybercrime is costing Australian businesses more than $600
million annually (Edwards, 2009)
The Commonwealth Cybercrime Bill 2001
– covers the following offences:
 Unauthorised access, modification or impairment to commit a
serious offence
 Unauthorised modification of data to cause impairment
 Unauthorised impairment of electronic communications
 Possession of data with intent to commit computer offence
(described as "akin to the more familiar offences of 'going
equipped for stealing' or possession of an offensive weapon")
 Supply of data with intent to commit a computer offence
 Unauthorised access to restricted data
 Unauthorised impairment of data held in a computer disk, credit
card, etc.
(Electronic Frontiers Australia, Inc., 2008)
The Model Criminal Code –
Chapter 4: Damage and Computing Offences
 State & territory regulation of cybercrime
 Contains a range of offences concerned with unauthorised access,
modification and impairment of data
 Further divided into Serious Computer Offences (Division
477) or Other Computer Offences (Division 478)
(Clough, 2010, p44)
For an in-depth exploration of
Cybercrime and the implications it is
having on Australian Society, read
the “Cybercrime” research paper by
Sarah Johnson.
 Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet
Business Law Services, Inc. Available from URL:
http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews
[Accessed 13/11/2010]
 Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.
 Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG
Communications. Available from URL:
http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_
report/ [Accessed 13/11/2010]
 Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia:
EFA, Inc. Available from URL:
http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]
 Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New
Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download
from URL:
http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf
[Accessed 13/11/2010]
 Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America:
ABC-CLIO.
 Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
gururaj lulkarni
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Ppt
PptPpt
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Ppt
PptPpt
Ppt
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
Symantec Website Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
kinish kumar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 

Viewers also liked (12)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Similar to Cybercrime online presentation

Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
anthonywong
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
Iaetsd Iaetsd
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
Elizabeth Hall
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
Christina Bauer
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
Elizabeth Hall
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
Olusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
kamalbhatt9229
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 

Similar to Cybercrime online presentation (20)

Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Cybercrime online presentation

  • 1. Research Assignment Communication Technologies & Change Sarah Johnson – u3025130 Tutorial Group #4
  • 2. Cybercrime is defined as: ‘computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks’ (Yar, 2006, p9)
  • 3.  Cracking – accessing computer systems without authority to commit a crime. Includes deliberately corrupting or erasing information within computer systems, defacing websites, and running copy-protected programs without a password or valid license string  Piracy – copying protected software without authorisation  Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  • 4.  Cyberstalking – using a computer to harass and terrorise selected human and institutional targets, causing them to fear injury or harm  Cyberpornography – producing and/or distributing pornography using a computer  Cyberterrorism – unlawful attacks and threats of attack by terrorists against computers, networks, and the information stored therein to intimidate or coerce a government or its people to further the perpetrator’s political or social objectives
  • 5.  Hacker unions or crews (domestic and foreign)  Organised crime  Foreign Intelligence Services  Botnet operators  Random individuals looking to take advantage of readily available black (underground) technologies (Fujitsu, 2009, p4)
  • 6.  In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime (Fujitsu, 2009, p3)  The 2005 AusCERT Australian Computer Crime and Security Survey found that in total, $16.9million was lost by 110 of the Australian organisations surveyed (Arias, 2007)  A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually (Edwards, 2009)
  • 7. The Commonwealth Cybercrime Bill 2001 – covers the following offences:  Unauthorised access, modification or impairment to commit a serious offence  Unauthorised modification of data to cause impairment  Unauthorised impairment of electronic communications  Possession of data with intent to commit computer offence (described as "akin to the more familiar offences of 'going equipped for stealing' or possession of an offensive weapon")  Supply of data with intent to commit a computer offence  Unauthorised access to restricted data  Unauthorised impairment of data held in a computer disk, credit card, etc. (Electronic Frontiers Australia, Inc., 2008)
  • 8. The Model Criminal Code – Chapter 4: Damage and Computing Offences  State & territory regulation of cybercrime  Contains a range of offences concerned with unauthorised access, modification and impairment of data  Further divided into Serious Computer Offences (Division 477) or Other Computer Offences (Division 478) (Clough, 2010, p44)
  • 9. For an in-depth exploration of Cybercrime and the implications it is having on Australian Society, read the “Cybercrime” research paper by Sarah Johnson.
  • 10.  Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet Business Law Services, Inc. Available from URL: http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews [Accessed 13/11/2010]  Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.  Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG Communications. Available from URL: http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_ report/ [Accessed 13/11/2010]  Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia: EFA, Inc. Available from URL: http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]  Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download from URL: http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf [Accessed 13/11/2010]  Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America: ABC-CLIO.  Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.