SlideShare a Scribd company logo
What can be done to stop the
growing threat of cybercrime?

              ICT ICA 3
               GROUP MEMBERS:
        HARRY PANG JIA WEI, 083142M
       HO PEI JING CHERMAINE, 084288T
      JOHNSON OOI CHEE TIONG, 080785Y

                BF0801 - FA
What is Cybercrime?

 Refers to criminal activity where the computer is the
 source of a crime

 Describing criminal activity in which the computer
 or the network is a necessary part of the crime
Cybercrime

 Can be divided into two categories:
   - crimes that target computer network or
     devices directly.
   - crimes facilitated by computer networks or
     devices.
Types of Cybercrime

 Spam
 Fraud
 Obscene or offensive content
 Harassment
 Drug trafficking
 Cyberterrorism
Laws
 We have laws to deter criminal acts
 One very obvious way to combat cyber crime is to
  have laws to deter cyber crimes.
 Singapore has the Computer Misuse act and is
  continuously reviewed.
 Assistant Professor Warren Chik recommends to
  include provisions on cyber forgery, cyber fraud and
  identity theft in 2006
“Law enforcement Trojans”


 Tools used by backers can also be used by the police
 German police are reviewing the idea to plant
 “trojans” on the PCs of suspects
Hiring hackers

 The trend has been to hire ex-hackers
 Reasons
   - For their skills.
 Downside
   - Giving them access may be dangerous
 Solutions?
   - Interviews and test to determine if he/she is
   trustworthy
Credit card frauds
 Credit cards are convenient
 Credit card frauds are predominant
 In 2005, the amount of credit card frauds go beyond
  400 million pounds
 One recent way to combat this is to have stronger
  security
 For example the Emue card by VISA
Spoof scamming to prevent Internet Fraud


  Campaigns were held by the authorities in the
   US and Canada.
  They use Internet banner advertising and
   sponsored links on search engines.
  Direct consumers to fake websites and stop real
   scammers from attacking
Using Anti-Virus Softwares to prevent DoS and
                   Viruses


  • The Conficker worm is a potent worm which has
    infected millions of computers running the
    Windows OS.
  • Remedies are provided by anti-virus vendors
    such as Symantec and Trend Micro.
  • Preventing this worm can be done through Anti-
    Virus softwares.
Understanding Cybercrime to prevent it


 By understanding Cybercrime, you can help
  protect yourself against:
 Internet Frauds.
 Getting spammed.
 Being a victim of Phishing Scams.
In Summary...


 Cybercrime refers to criminal activity where the
  computer is the source of a crime.
 Can consist of DoS, computing viruses, phishing
  scams, fraud and identity theft, spam and many
  other unethical acts.
What can be done to stop the growing threat of
               Cybercrime?



 Laws to deter criminal acts (Legislation).
 Trapping the hackers.
 Hiring White Hat Hackers.
 Using Anti-Viral, Anti-Spyware and Firewalls.
 Understanding Cybercrime.
 Educate the youth on Cybercrime.
ICT ICA3

More Related Content

What's hot

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
Grant Thornton Bangladesh
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
Jacqueline Fick
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
Mumbai University
 
Cybercrime
CybercrimeCybercrime
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
pronab Kurmi
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Srishti Jain
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
MD Alauddin
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
Goutama Bachtiar
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
Manish Singh
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
Shaheda Afreen
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
Hamza Khalid
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
kg19
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Raja Farhan Saeed
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Mary Rayme
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 

What's hot (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Impacts of ict in society
Impacts of ict in societyImpacts of ict in society
Impacts of ict in society
Mat_J
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]
DeepNines Technologies
 
Linxen&pimmer
Linxen&pimmerLinxen&pimmer
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Phil Agcaoili
 
Digital divide linear powerpoint
Digital divide linear powerpointDigital divide linear powerpoint
Digital divide linear powerpoint
lawhitney83
 
The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008
Tim Bass
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
SOURAV CHANDRA
 
Modern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelModern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panel
Ramsés Gallego
 
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and HanutDigital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
smuench
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Digital Divide PPT
Digital Divide PPTDigital Divide PPT
Digital Divide PPT
meganshapedspace
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
smuench
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
akshayniraj
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
Aditya
 
ICT Centered Teaching & Learning
ICT Centered Teaching  & LearningICT Centered Teaching  & Learning
ICT Centered Teaching & Learning
St.Xavier's College (Autonomous),Palayamkottai
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

Viewers also liked (20)

Impacts of ict in society
Impacts of ict in societyImpacts of ict in society
Impacts of ict in society
 
Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]Defending Against Modern Threats Wp Lr[1]
Defending Against Modern Threats Wp Lr[1]
 
Linxen&pimmer
Linxen&pimmerLinxen&pimmer
Linxen&pimmer
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Digital divide linear powerpoint
Digital divide linear powerpointDigital divide linear powerpoint
Digital divide linear powerpoint
 
The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008The Top Ten Cybersecurity Threats of 2008
The Top Ten Cybersecurity Threats of 2008
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Modern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelModern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panel
 
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and HanutDigital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Digital Divide PPT
Digital Divide PPTDigital Divide PPT
Digital Divide PPT
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
ICT Centered Teaching & Learning
ICT Centered Teaching  & LearningICT Centered Teaching  & Learning
ICT Centered Teaching & Learning
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 

Similar to ICT ICA3

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
KavithaK23
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
Shylesh BC
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 

Similar to ICT ICA3 (20)

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Recently uploaded

Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

ICT ICA3

  • 1. What can be done to stop the growing threat of cybercrime? ICT ICA 3 GROUP MEMBERS: HARRY PANG JIA WEI, 083142M HO PEI JING CHERMAINE, 084288T JOHNSON OOI CHEE TIONG, 080785Y BF0801 - FA
  • 2. What is Cybercrime?  Refers to criminal activity where the computer is the source of a crime  Describing criminal activity in which the computer or the network is a necessary part of the crime
  • 3. Cybercrime  Can be divided into two categories: - crimes that target computer network or devices directly. - crimes facilitated by computer networks or devices.
  • 4. Types of Cybercrime  Spam  Fraud  Obscene or offensive content  Harassment  Drug trafficking  Cyberterrorism
  • 5. Laws  We have laws to deter criminal acts  One very obvious way to combat cyber crime is to have laws to deter cyber crimes.  Singapore has the Computer Misuse act and is continuously reviewed.  Assistant Professor Warren Chik recommends to include provisions on cyber forgery, cyber fraud and identity theft in 2006
  • 6. “Law enforcement Trojans”  Tools used by backers can also be used by the police  German police are reviewing the idea to plant “trojans” on the PCs of suspects
  • 7. Hiring hackers  The trend has been to hire ex-hackers  Reasons - For their skills.  Downside - Giving them access may be dangerous  Solutions? - Interviews and test to determine if he/she is trustworthy
  • 8. Credit card frauds  Credit cards are convenient  Credit card frauds are predominant  In 2005, the amount of credit card frauds go beyond 400 million pounds  One recent way to combat this is to have stronger security  For example the Emue card by VISA
  • 9. Spoof scamming to prevent Internet Fraud  Campaigns were held by the authorities in the US and Canada.  They use Internet banner advertising and sponsored links on search engines.  Direct consumers to fake websites and stop real scammers from attacking
  • 10. Using Anti-Virus Softwares to prevent DoS and Viruses • The Conficker worm is a potent worm which has infected millions of computers running the Windows OS. • Remedies are provided by anti-virus vendors such as Symantec and Trend Micro. • Preventing this worm can be done through Anti- Virus softwares.
  • 11. Understanding Cybercrime to prevent it  By understanding Cybercrime, you can help protect yourself against:  Internet Frauds.  Getting spammed.  Being a victim of Phishing Scams.
  • 12. In Summary...  Cybercrime refers to criminal activity where the computer is the source of a crime.  Can consist of DoS, computing viruses, phishing scams, fraud and identity theft, spam and many other unethical acts.
  • 13. What can be done to stop the growing threat of Cybercrime?  Laws to deter criminal acts (Legislation).  Trapping the hackers.  Hiring White Hat Hackers.  Using Anti-Viral, Anti-Spyware and Firewalls.  Understanding Cybercrime.  Educate the youth on Cybercrime.