Chapter 19.1 Cyberlaw and Cybercrime

Slides:



Advertisements
Similar presentations
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Advertisements

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Unethical use of Computers and Networks
CYBER CRIME.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Nasca The agency relationship involves three parties: the genuine agent, the special agent, and the contractor. the independent.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cybercrime What is it, what does it cost, & how is it regulated?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Chapter 11 Business and Technology Objective 2.04.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
What is ‘Crime’?.
GCSE ICT SECURITY THREATS.
IT Security  .
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
A Project on CYBER SECURITY
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
The Best Way To Secure U R Self
COMPUTER CRIME.
Securing Information Systems
Five Unethical Uses of Computers
Forensic and Investigative Accounting
Philip Nichilo Vincent Carestia
Chapter 11 Business and Technology
HOW DO I KEEP MY COMPUTER SAFE?
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computer Security.
Securing your system, protecting your digital data and devices.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Chapter 19.1 Cyberlaw and Cybercrime Business Law II Chapter 19.1 Cyberlaw and Cybercrime

Introduction to CyberCrime

Development of Cyberlaw Cyberlaw– the area of law which concerns computers and computer-related crimes Cybercrime—any criminal activity associated with a computer

Two approaches to develop cyberlaw: Cybertrespass Approach (or computer trespass) Any illegal activity already in the criminal code committed by using a computer Rewriting of Criminal Code Some states have written statutes for every crime that can possibly be committed by using a computer This is difficult since each new statute must be individually created by state legislature

Cybercrimes Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing) False emails, false websites They attempt to lure people and obtain personal information of their victims Cyberpiracy: Using a computer to steal data stored in digital format (intellectual property theft)

Cybercrimes Cont. 3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff Users who spend time in chat rooms are vulnerable Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money

CyberCrimes Cont. Identity Theft—using computer to steal financial, employment, educational, medical, and personal information Attempt to obtain credit card numbers, PINS, SSN, access codes, etc. Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life. Cyberterrorism—using computer person interrupts national infrastructure Powergrids, air traffic control system, and the national defense

Cybercrimes Cont. Cybervandalism—disrupting, damaging, or destroying web site or computer network Hackers- usually done for revenge or to attack a business Cybergerm Warfare—transmit computer virus to destroy others computer files/systems Firewalls and anti-virus software can sometimes block many viruses

Cybertorts Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime Cyberdefamation—communication via computer or other electronic device of false data to damage person’s reputation Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer

NCIS American Special Agent Documentary on Computer Crime

Cyber Assess What crime involved using a computer to obtain a payoff? What crime involved disrupting infrastructure? What crime involves using a computer to steal financial, employment, or personal information?