Download presentation
Presentation is loading. Please wait.
Published byLeon Anderson Modified over 9 years ago
2
It is a Criminal Activity Committed On The Internet. A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either A tool or target or both”. Cyber crime offenses against the information technology infrastructure
3
Such conducts includes: -Illegal access -Illegal interception -System interference -Data interference -Misuse of device -Fraud -Forgery
4
The computer as a target using a computer to attack other computers. Hacking, virus/worm attacks, DoS(Denial of Service) attack etc. The computer as a weapon using a computer to commit real world crimes. Cyber terrorism, Credit cards frauds etc.
5
Unauthorized access therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Hackers write or use ready-made computer programs to attack to attack the target computer
6
Email spamming Email “spamming” refers to sending email to thousands and thousands of users-similar to a chain letter. Sending malicious code through email. Emails are used to send viruses etc. through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
7
Flooding a computer resource with more request than it can handle. This causes the resource to crash thereby denying access of service to unauthorized users: Example Attempts to flood a network, there by preventing legitimate network traffic.
8
Counterfeit currency notes, postage and revenue stamps, marks sheets etc can be forged using sophisticated computers, printers and scanners.
9
Drug traffickers are increasingly taking advantage of the Internet. To sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.e-maildrug traffickersinternet cafes
10
Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks are the most likely. Others like police, medical, fire and rescue systems etc. Cyber terrorism is an attractive option for modern terrorists for several reasons
12
The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national- level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia.Department of DefenseEstoniaGeorgia
13
Sailors analyze, detect and defensively respond to unauthorized activity within U.S. NavyU.S. Navy information systems and computer networks
14
http://en.wikipedia.org/wiki/Computer_crime http://en.wikipedia.org/wiki/Computer_crime http://www.google.com.ph/search?q=Cyber+terrori sm&client=firefox-a&hs=P9j&rls=org.mozilla:en- US:official&source=lnms&tbm=isch&sa=X&ei=nzwTU qOlLea5iQfA8YCQBw&ved=0CAkQ_AUoAQ&biw=1 440&bih=797#facrc=_&imgdii=_&imgrc=w5kqyTCs wucaGM%3A%3Bja- Ne1lefcklQM%3Bhttp%253A%252F%252F2we26u4fa m7n16rz3a44uhbe1bq2.wpengine.netdna- cdn.com%252Fwp- content%252Fuploads%252F122112_1429_Cyberter ror1.jpg%3Bhttp%253A%252F%252Fresources.infos ecinstitute.com%252Fcyberterrorism-distinct-from- cybercrime%252F%3B846%3B761
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.