Computer Crime 5
Computer Crime 5
Computer Crime 5
Agenda
What
Criminals
Combating
1. Definition
Inevitable
786 3
# of successful system attacks (8 3 attempts) # of detections (out of 786 successful attempts)
3. Potential Criminals
Employees/Ex-employees
Users Analysts Programmers
% 8 %
% of crimes committed
1. Hacking
The activity of breaking into a computer system to gain an unauthorized access is known as hacking.
2. Phishing:
Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source.
3. Viruses
Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users.
4. Cyber stalking:
The use of communication technology, mainly the Internet, to torture other individuals is known as cyber stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber stalking activities.
5. Identity Theft:
This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own.
7. Spam:
The most common type of cyber crime is spam. While email spam laws are fairly new, there have been laws on the books regarding "unsolicited electronic communications" for many years.
8. Fraud:
Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address.
9. Cyber Bullying:
Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.
12. Piracy:
Far and away the most talked about form of cyber crime is robbery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.
12. Piracy:
Downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.
14. Harassment:
A particularly nasty kind of personnel breach we've seen lately is harassment on the Internet. Sending threatening email messages and slandering people on bulletin board systems and newsgroups is all too common.
Combating Model
1. Awareness or Education: It means
that sufficient awareness should be provided to the society, utilizing different channels of Mass media to inform and educate people about Computer Crimes.
Combating Model
2. Passing Laws and Regulations: The government of any country is responsible to pass effective legislations against Computer Crime. These legal documents must be publicized in order to gain larger impact.
Combating Model
3. Prosecution and Punishment:
In order to prevent such crimes in the future the law enforcement agencies must work hard to deal with Computer Crime Cases in a professional way and bring those criminal to justice. The punishment should be exercised in a fair and strict manner.
Citations
1. State of New Jersey Commission of Investigation, Computer Crime, a Joint Report, June . 1 Ronald B. Standler, Computer Crime, Copy Right 1999, Michael Kunz & Patrick Wilson, Computer Crime and Computer Fraud, Fall 4. Wikipedia the Free Encyclopaedia www.mariosalexandrou.com/definition/computer-crime.asp Free Online Dictionary. Paul Mobbs, Computer Crime, the Law on the Misuse of 3. Computers and Networks, Apr, Manali Oak, Types of Computer Crimes, Buzzle.com www.ehow.com/facts_497 64_different-types-cybercrime.html David Icove, Karl Seger & William VonStorch, Computer Crime A Crimefighters Handbook, 1st Edition August 1995. Jason Upchurch, Combating Computer Crim, September, 6, 1.
Thank You!