Download presentation
Presentation is loading. Please wait.
Published byChester Wade Modified over 9 years ago
1
Greg and Jamie unit 5 internet crime
2
INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
3
telecommunication crime Every one commits theft who fraudulently, maliciously, or without colour of right, (a) abstracts, consumes or uses electricity or gas or causes it to be wasted or diverted; or (b) uses any telecommunication facility or obtains any telecommunication service.
4
What are the main types of computer and telecommunication crime? This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement. Exactly what is illegal varies greatly from territory to territory. Consequently, the growth of international data communications and in particular the Internet has made these crimes both more common and more difficult to police. Luckily there are people fighting computer crime and it is taken very seriously by government agencies.
5
famous computer hacker Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.
6
News on internet crime A team of cyber crime unit of district police has busted a six member gang involved in purchasing costly items through online shopping by using bank accounts of various people. The gang used to buy branded items including laptops, mobile phone, readymade garments etc. Recently when various police stations got the complaints that someone has sneaked into the accounts of different people, SP Crime, Arun Kumar Pandey handed over these cases to the cyber crime unit. Acting promptly and solving the case, the unit arrested six persons involved in this theft.
7
What is the RCMP doing to prevent this? It is important to understand that today almost any "traditional" crime can be committed with the help of technology. Those who are victims of cybercrimes must understand that they have the same recourse than if the offence had been committed without the use of technology. For example, a death threat made by e- mail or text message must be treated in the same way as a death threat made verbally. Furthermore, the Internet is a worldwide network that is not yet regulated like radio or television. For instance, what is illegal in Canada can be perfectly legal in another country. However, as Canadian citizens, we have to abide by the laws of our country.
8
The Criminal Code of Canada and the Copyright Act An increasing number of Canadian families have access to Internet. When used with caution, cyberspace is an extraordinary communication and information medium. However, surfing the Net involves certain risks. The Internet is a network of millions of interconnected computers. Unlike a TV set, the computer provides for two- way communication. In other words, when you connect to another computer, not only do you receive information, but you also transmit data!
9
Why do people feel that this type of activity (burning CD's, hacking into other peoples computers etc.) is not a crime? Hacking is one of the most well-known types of computer crime. In this context, the term refers to the unauthorized access of another’s computer system. These intrusions are often conducted in order to launch malicious programs known as viruses, worms, and Trojan Horses that can shut down or destroy an entire computer network. Hacking is also carried out as a way to take credit card numbers, internet passwords, and other personal information. By accessing commercial databases, hackers are able to steal these types of items from millions of internet users all at once.
10
What are some common methods to commit computer related crime? Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. Crimes that primarily target computer networks or devices include: Computer viruses Denial-of-service attacks Malware (malicious code)
11
Why is it important that we become more aware of computer crime? Because of: Online Stalking, Bullying, and Sex Crimes Identity Theft and Other Frauds Hacking, Piracy, and Cyber Terrorism
12
. What are some steps we can use to establish and maintain an adequate computer security? How you can protect yourself from computer crime Though cyber-crime statistics are on the rise, even the most serious Internet criminals rarely make the FBI Fugitives List. These types of perpetrators are extremely difficult to track down. And, increasingly, these crimes appear to be originating from overseas and outside the jurisdiction of U.S. law enforcemnt. However, it is not that difficult to keep from being a victim of most computer crime simply by knowing what to look for and using come good judgment.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.