Group Members: Danushka Nirmal De Silva(4240138)
Ahmad Akmal Afiq(4237323)
TYPES OF CYBERCRIME
CASE STUDY (1 & 2)
The internet is growing rapidly.
Rise in new opportunities in the modern
Internet also has its own disadvantages
which is :
WHAT IS CYBERCRIME ?
Crime committed using a computer and the
internet to steal a person’s identity or illegal
imports or malicious programs
the computer used as an object or subject of
Abacus is the earliest and simplest form of computer
which dates back about 3500 B.C and was used in
some parts of the world such as China
First recorded cyber crime dates back to 1820
Joseph-Marie Jacquard had a textile manufacture
introduced the loom
The loom threatened the employees in the firm who
then decided to sabotage it in order to discourage
Jacquard from further use of the loom
First spam email took place in 1978 when it
was sent over the Arpanet
The first virus was installed on an Apple
computer in 1982
Illegal intrusion into a computer system
Hackers writes or use ready-made computer
programs to attack the target computer
Includes breaking into a computer with
intention to steal, damage, modify or monitor
data or settings within a system
The internet is being highly used by its
abusers to reach and abuse children
Nowadays, more homes have internet
access, more children would be using the
internet and high chances of falling victim to
Denial of Service
The criminal floods the bandwidth of victims
network or fills his e-mail box with spam mail
depriving him of the services he is entitled to
access or provide
Malicious software that attaches itself to
Circulate themselves to other files and to
other computers on a network
Affect the data on a computer, either by
altering or deleting it
An act of damaging or destroying data rather
than stealing or misusing them
It is the actual use of computers and internet
technology to cause intimidation and
Uses the internet or network to destroy or
damage computers for political reasons
Cyber terrorists could hack into a
computers, changing the formula of some
essential medication and causing thousands
Theft of software through an illegal act of
copying a genuine programs or the
counterfeiting and distribution of products
intended to pass for the original
Copying and using computer programs in
violation of copyrights and trade secret laws
Retail revenue losses worldwide are ever
increasing due to software piracy
CASE STUDY 1
CYBER CRIMINALS TARGET
SKYPE, FACEBOOK &
CASE STUDY 1
Cyber criminals target social network &
Windows users with Blackhole malware.
Disuised as Windows
licences, Facebook account
verification, Skype voicemail
notifications & spam messages.
Biggest dangers Internet users face.
Users who click the malicious Blackhole
links & downloaded the files were
infected with a Trojan virus.
Spam email campaign targeted
Facebook users with a message
claiming that their account was locked
and needed to be re-verified.
The links led to Blackhole exploits and a
Zeus Trojan disguised as an Adobe
Flash Player download.
Users should verify the source and
destination of any link before clicking
they should never run executable files
unless they are positive that the source
CASE STUDY 2
Chinese hackers increasingly attracted to
US drone technology
Hacker group “Comment Crew” hacked US
military network stealing classified
information of US military drones.
They targeted both large
companies, including US military contractors
& military firms focused on drone technology.
Chinese drone identical to US Predator
US drone market could be the first victim of
Antivirus & Anti Spyware software
Cyber Law & Ethics
Antivirus & Anti Spyware
to identify and eliminate computer
viruses and other malicious software.
to restrict backdoor program, trojans
and other spywares to be installed on
protects a computer network from
guards an internal computer network
against malicious access from outside
science of encrypting and decrypting
Encryption is like sending a postal mail
to another party with a lock code on the
envelope which is known only to the
sender & the recipient.
A number of cryptographic methods
have been developed and some of them
are still not cracked.
Cyber Laws & Ethics
Responsibility of every individual to
follow cyber ethics and cyber laws.
ISP should provide high level security at
Security software as a protection
Essential features in the cyber world
Cybercrimes increase with the rapidly
growing internet technology.
It is not possible to eliminate
It is quite possible to
Awareness is always the
first step to protect yourself.