Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Chapter 14 Crime and Justice in the New Millennium
Information Warfare Theory of Information Warfare
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
Types of Crime.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Unit 4 – Impact of the use of IT on Business Systems.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Unethical use of Computers and Networks
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Information Warfare Playgrounds to Battlegrounds.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
CRIMES Used by permission. For Educational purposes only.
Hurdles in implementation of cyber security in India.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Information Warfare Playgrounds to Battlegrounds.
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Cyber crime and security issues
Financial Institutions – Cyber Risk
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Seminar On Cyber Crime Submitted To: Submitted By:
COMPUTER CRIME.
Five Unethical Uses of Computers
SEC 103 Enthusiastic Studysnaptutorial.com
Cyber Trends and Market Update
A Gift of Fire Third edition Sara Baase
Chapter 13 Security and Ethical Challenges.
Prepared By : Binay Tiwari
Forensic and Investigative Accounting
Philip Nichilo Vincent Carestia
Preventing Information Technology Crimes
Security of network and information systems
Presentation transcript:

Computer Crimes and Abuses1 By: Saad Shwaileh

Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer Crimes. Laws and Acts about Computer Crimes. In USA In KSA Facts and Surveys ! School of Cyber Laws Computer Security Institute (CSI)

Computer Crimes and Abuses3 Introduction Computer Crimes: 1 st half of the year ! Mondays + Fridays + Saturdays. Mostly in September. 97 % victims are Female employees. Difference between Comp. Crimes & Abuse ? What is most crime happen ? Data Theft !

Computer Crimes and Abuses4 What is a Computer Crime & Abuse Unethical, illegal, or criminal activity Directed to any information architecture. Crimes happens on Computers or Network. Computer Crimes – Electronic Crimes. Computer Crimes: forgery, theft, fraud. Computer Abuse: bad use of computer.

Computer Crimes and Abuses5 Types of Computer Crimes Cyber Crime Computing Virus Fraud and Identity Theft Cyber Stalking Cyber Terrorism ? Information Warfare

Computer Crimes and Abuses6 Laws and Act of Computer Crimes in USA To reduce the impacts of computer crimes. In 1984, US Congress introduced: The Computer Fraud and Abuse Act. Modified in 2001 by USA PATRIOT: 1. Maximum penalty for violations =10 years 1 st time, 20 years 2 nd time of offense. 2. Increase the punishment – govermental Unothorized access to more than $ including damage to foreign computers Having violations to more than $ 5000.

Computer Crimes and Abuses7 Laws and Act of Computer Crimes in KSA Saudi Legislation Body, “ Al-Shoura “ 1. Websites defacing + data theft cause a fine of $ 130 thousand or even a maximum one year prison sentence. 2. Same punishment - using the internet or electronic tools for defamation or even to accessing others private networks.

Computer Crimes and Abuses8 Laws and Act of Computer Crimes in KSA 3. Websites - pornographic content Defaming humanity. Information promoting drug. Punishment = 5 years in prison ! 4. Hacking - Governmental Networks Access Spreading or Sharing terrorism-related knowledge. Punishment = $ 1.3 million and ten years in the prison

Computer Crimes and Abuses9 Facts and Surveys ! School of Cyber Laws (ASCL) - India 6266 incidents of computer crime and abuse. Two years ( 2001 – 2003 ) All organizations participated – survey. Most impact on IT organization – why ? Least on some other organizations :

Computer Crimes and Abuses10 Contd..

Computer Crimes and Abuses11 Facts and Surveys ! School of Cyber Laws (ASCL) - India

Computer Crimes and Abuses12 Facts and Surveys ! Computer Security Institute (CSI) In 2005, another survey done by Computer Security Institute (CSI). Reported important statistics: 1. Financial losses resulting from hacking some security centers decreased to 61% average loss of $ 204,000 per respondent from $ 526,000 in 2004.

Computer Crimes and Abuses13 Contd.. 2. About 32% of overall financial losses – by virus attacks ! 3.The unauthorized access dramatically increased to 24%. 4. Theft of proprietary information – Doubled.

Computer Crimes and Abuses14 Conclusion Computer crimes – result of bad use of computer. Types of Computer Crimes What is left ? Strict Global and Local laws. Statistics and Facts.

Computer Crimes and Abuses15 Questions and Answers