SlideShare a Scribd company logo
1 of 20
CYBER CRIMES
MALAYSIAN UNIVERSITY ENGLISH TEST (MUET) UNIT
ASSIGNMENT 4
MUET
800/2 SPEAKING
PREPARED BY:
1. MUHAMMAD IMTIYAZ BIN MOHAMAD SOKRI
2. AHMAD LUQMAN BIN MOHD FADZIL
3. MOHD FITRI FAHMI BIN HASMADI
4. AIMAN ASYRAF BIN OTHMAN
INTRODUCTION
• Cyber crime is an activity done using
computers and internet. We can say that it
is an unlawful acts wherein the computer
either a tool or target or both.
HISTORY OF CYBER CRIME
• When computers and networks came into being in the
1990s, hacking was done basically to get more
information about the systems.
• As a result, many networks were affected; right from the
military to commercial organizations.
• However, with malicious software becoming ubiquitous
during the same period, hacking started making networks
and systems slow.
• As hackers became more skillful, they started using their
knowledge and expertise to gain benefit by exploiting and
victimizing others
DEFINITION OF CYBER CRIME
• Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes
conducted through the internet. For example; hate
crimes, telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to be cyber
crimes when the illegal activities are committed through
the use of a computer and the Internet.
• Involves illegal imports,malicious programs
TYPES OF CYBER CRIMES:
• HACKING
• CYBER TERRORISM
• EMAIL SPOOFING
• PHISHING
• SOFTWARE PIRACY
• CHILD ABUSE
 The main cause of cybercrime is accessing sensitive
information and data and using it means a rich harvest of
returns and catching such criminals is difficult.
 Hence, this has led to a rise in cyber crime across the
world
Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Software Piracy - Theft of software through the illegal
copying of genuine programs or the counterfeiting
and distribution of products intended to pass for
the original. The unauthorized copying of software.
Email spoofing - A spoofed email is one that appears
to originate from one source but actually has been
sent from another source.
Phishing - The e-mail directs the user to visit a Web
site where they are asked to update personal
information, such as passwords and credit card, social
security, and bank account numbers, that the legitimate
organization already has .
Cyber Terrorism- Terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and
hate E-mails , attacks on service network etc.
• Child Pornography - The Internet is being highly
used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access
to internet, more children would be using the
internet and more are the chances of falling victim
to the aggression of Pedophiles.
How Do They Operate:
How do they operate Pedophiles use false identity
to trap the children , Pedophiles connect children in
various chat rooms which are used by children to
interact with other children.
CATEGORIES OF CYBER CRIME
• INDIVIDUAL
- This type of cyber crime can be in the form of cyber stalking,
distributing pornography, trafficking and “grooming”.
• PROPERTY
- Steal a person’s bank details and siphon off money,misuse the
credit card to make numerous purchases online,use malicious
software to gain access to an organization’s website or disrupt
the systems of the organization.
• GOVERNMENT
- Referred to as cyber terrorism. If successful, this category can
wreak havoc and cause panic amongst the civilian population.
In this category, criminals hack government websites, military
websites or circulate propaganda
PREVENTION OF CYBER CRIME
 Anti-virus software .
 Frequent password changing.
 Firewalls.
 Safe surfing.
 Frequent virus checks.
 Email filters.
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P(Peer-to-peer) programs
 Avoid downloading freeware
 If attacked, disconnect the network. Do not turn off the
computer
 So we must pay attention to all those issues and protect the
World from Cyber Crime
 “If you spend more on coffee than on IT security, you will
be hacked. What’s more, you deserve to be hacked. —
White House Cybersecurity Advisor” ─ Richard Clarke
ATTACHMENTS :
REFERENCES:
• http://www.crossdomainsolutions.com/cyber-crime/
Cybercrimes

More Related Content

What's hot

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 

What's hot (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Defamation on the Internet
Defamation on the InternetDefamation on the Internet
Defamation on the Internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 

Viewers also liked

Gross domestic product
Gross domestic productGross domestic product
Gross domestic product
dadamimi
 
Speaking testpet
Speaking testpetSpeaking testpet
Speaking testpet
VQuevedo
 
Muet paper 4
Muet paper 4Muet paper 4
Muet paper 4
medelena
 
Muet Speaking Presentation
Muet Speaking PresentationMuet Speaking Presentation
Muet Speaking Presentation
Nur Amirah Amran
 
MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)
Ahmad Ashaari
 
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_JonesTOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
Johnathan Jones
 
Measuring National Output and National Income
Measuring National Output and National IncomeMeasuring National Output and National Income
Measuring National Output and National Income
Noel Buensuceso
 
Gross National Product
Gross National ProductGross National Product
Gross National Product
Arvinda Kumar
 

Viewers also liked (20)

Gross domestic product
Gross domestic productGross domestic product
Gross domestic product
 
Speaking testpet
Speaking testpetSpeaking testpet
Speaking testpet
 
Muet paper 4
Muet paper 4Muet paper 4
Muet paper 4
 
5 speaking component (part 1) (MUET)
5 speaking component (part 1) (MUET)5 speaking component (part 1) (MUET)
5 speaking component (part 1) (MUET)
 
Muet Speaking Presentation
Muet Speaking PresentationMuet Speaking Presentation
Muet Speaking Presentation
 
Muet speaking lessons set 3
Muet speaking lessons set 3Muet speaking lessons set 3
Muet speaking lessons set 3
 
MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)MUET Speaking Exam (UiTM Sri Iskandar)
MUET Speaking Exam (UiTM Sri Iskandar)
 
Muet speaking lesson
Muet speaking lessonMuet speaking lesson
Muet speaking lesson
 
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_JonesTOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
TOEFL_SPEAKING_overview_and_question1-Johnathan_Jones
 
SPEAKING Past Year Questions
SPEAKING Past Year QuestionsSPEAKING Past Year Questions
SPEAKING Past Year Questions
 
Expressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task BExpressions to use for MUET Speaking Task B
Expressions to use for MUET Speaking Task B
 
Muet speaking lessons 2
Muet speaking lessons 2Muet speaking lessons 2
Muet speaking lessons 2
 
Muet workshop 2014
Muet workshop 2014Muet workshop 2014
Muet workshop 2014
 
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
INTRODUCTION TO MUET FOR LOWER 6 ORIENTATION WEEK
 
MUET Speaking Tips and Tricks
MUET Speaking Tips and TricksMUET Speaking Tips and Tricks
MUET Speaking Tips and Tricks
 
July-year 2012 MUET
July-year 2012 MUETJuly-year 2012 MUET
July-year 2012 MUET
 
MUET Mid years 2011
MUET Mid years 2011MUET Mid years 2011
MUET Mid years 2011
 
Gross Domestic Product
Gross Domestic ProductGross Domestic Product
Gross Domestic Product
 
Measuring National Output and National Income
Measuring National Output and National IncomeMeasuring National Output and National Income
Measuring National Output and National Income
 
Gross National Product
Gross National ProductGross National Product
Gross National Product
 

Similar to Cybercrimes

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Similar to Cybercrimes (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Recently uploaded

JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
Cara Menggugurkan Kandungan 087776558899
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Klinik kandungan
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Heena Escort Service
 
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On DeliveryBest Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
ritikaroy0888
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 

Recently uploaded (20)

Sawai Madhopur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sawai Madhopur Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsSawai Madhopur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sawai Madhopur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Kashipur Uttrakhand Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kashipur Uttrakhand Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKashipur Uttrakhand Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kashipur Uttrakhand Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsRameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Rameswaram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
 
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsCoorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Asli Taiwan ( 085657271886 ) Cytote pil telat bulan penggugu...
 
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMadikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
 
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
Lucknow ❤️ CALL GIRL 9241412435 ❤️ CALL GIRLS IN Lucknow ESCORT SERVICE ❤️ CA...
 
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On DeliveryBest Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
Best Call Girls In Calangute Beach North Goa👌9971646499👌Cash On Delivery
 
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kodaikanal Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Buku Prediksi Togel Sydney Malam ini 4d 100 perak MAGNUMTOGEL
Buku Prediksi Togel Sydney Malam ini 4d 100 perak MAGNUMTOGELBuku Prediksi Togel Sydney Malam ini 4d 100 perak MAGNUMTOGEL
Buku Prediksi Togel Sydney Malam ini 4d 100 perak MAGNUMTOGEL
 
Sikar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sikar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsSikar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sikar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
A brief introduction to debate skill for ENG154
A brief introduction to debate skill for ENG154A brief introduction to debate skill for ENG154
A brief introduction to debate skill for ENG154
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 

Cybercrimes

  • 1. CYBER CRIMES MALAYSIAN UNIVERSITY ENGLISH TEST (MUET) UNIT ASSIGNMENT 4 MUET 800/2 SPEAKING PREPARED BY: 1. MUHAMMAD IMTIYAZ BIN MOHAMAD SOKRI 2. AHMAD LUQMAN BIN MOHD FADZIL 3. MOHD FITRI FAHMI BIN HASMADI 4. AIMAN ASYRAF BIN OTHMAN
  • 2.
  • 3.
  • 4. INTRODUCTION • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. HISTORY OF CYBER CRIME • When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. • As a result, many networks were affected; right from the military to commercial organizations. • However, with malicious software becoming ubiquitous during the same period, hacking started making networks and systems slow. • As hackers became more skillful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others
  • 6. DEFINITION OF CYBER CRIME • Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). • Additionally, cyber crime also includes traditional crimes conducted through the internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. • Involves illegal imports,malicious programs
  • 7. TYPES OF CYBER CRIMES: • HACKING • CYBER TERRORISM • EMAIL SPOOFING • PHISHING • SOFTWARE PIRACY • CHILD ABUSE  The main cause of cybercrime is accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult.  Hence, this has led to a rise in cyber crime across the world
  • 8. Types of Cyber Crime Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  • 9. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has . Cyber Terrorism- Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.
  • 10. • Child Pornography - The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate: How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 11. CATEGORIES OF CYBER CRIME • INDIVIDUAL - This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”. • PROPERTY - Steal a person’s bank details and siphon off money,misuse the credit card to make numerous purchases online,use malicious software to gain access to an organization’s website or disrupt the systems of the organization. • GOVERNMENT - Referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda
  • 12. PREVENTION OF CYBER CRIME  Anti-virus software .  Frequent password changing.  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters.
  • 13.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P(Peer-to-peer) programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke
  • 15.
  • 16.
  • 17.
  • 18.