Date post: | 29-Oct-2015 |
Category: |
Documents |
Upload: | patty-aldana |
View: | 37 times |
Download: | 0 times |
of 30
7/15/2019 cybercrime.pptx
1/30
Patricia aldana
7/15/2019 cybercrime.pptx
2/30
Halder and Jaishankar (2011) defines Cybercrimesas: "Offences that are committed against individualsor groups of individuals with a criminal motive tointentionally harm the reputation of the victim orcause physical or mental harm to the victim directlyor indirectly, using modern telecommunicationnetworks such as Internet (Chat rooms, emails,notice boards and groups) and mobile phones(SMS/MMS)".
7/15/2019 cybercrime.pptx
3/30
Most of these crimes are not new. Criminalssimply devise different ways to undertake
standard criminal activities such as fraud, theft,
blackmail, forgery, and embezzlement using the
new medium, often involving the Internet
http://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Thefthttp://en.wikipedia.org/wiki/Blackmailhttp://en.wikipedia.org/wiki/Forgeryhttp://en.wikipedia.org/wiki/Embezzlementhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Embezzlementhttp://en.wikipedia.org/wiki/Forgeryhttp://en.wikipedia.org/wiki/Blackmailhttp://en.wikipedia.org/wiki/Thefthttp://en.wikipedia.org/wiki/Fraud7/15/2019 cybercrime.pptx
4/30
SOME THOUGHTS ABOUT CYBER CRIME
"The modern thief can steal more with a computerthan with a gun. Tomorrow's terrorist may be able to
do more damage with a keyboard than with a bomb".
National Research Council, "Computers at Risk",1991.
7/15/2019 cybercrime.pptx
5/30
Computer used to commit a crime
Child porn, threatening email, assuming someones
identity, sexual harassment, defamation, spam, phishing
Computer as a target of a crime
Viruses, worms, industrial espionage, software piracy,
hacking, DDoS attacks
7/15/2019 cybercrime.pptx
6/30
7/15/2019 cybercrime.pptx
7/30
Crime againstproperty
Crime againstGovernment
Crime againstpersons
7/15/2019 cybercrime.pptx
8/30
Cybercrime includes a wide variety of crime
Offences under cyber crime:
Offences against the confidentiality integrity and availability
of computer data and systems
Content-related offences
Copyright-related offences
7/15/2019 cybercrime.pptx
9/30
Cyber crimes
Hacking
Information
Theft
bombing
Salami
attacks
Denial of
Service
attacks
Trojan
attacks
7/15/2019 cybercrime.pptx
10/30
Credit card frauds. Cyber pornography.
Sale of illegal articles-narcotics, weapons, wildlife.
Online gambling.
Intellectual Property crimes- software piracy,
copyright infringement, trademarks violations,
theft of computer source code.
Email spoofing.
Forgery.
Defamation.
Cyber stalking.
Phishing.
Cyber terrorism.
7/15/2019 cybercrime.pptx
11/30
Hacking in simple terms means illegal
intrusion into a computer system without
the permission of the computer
owner/user.
7/15/2019 cybercrime.pptx
12/30
Malicious software that attaches itself to other
software.
Eg:-
(viruses, worms, Trojans, Time bomb,Logic Bomb)
7/15/2019 cybercrime.pptx
13/30
Spam is the equivalent of physical junk mail and
unsolicited telemarketing phone calls. It has become one
of the largest nuisances to computer users for both home
and business users.
7/15/2019 cybercrime.pptx
14/30
Email spam targets individual users with direct mail
messages. Email spam lists are often created by
scanning Usenet postings, stealing Internet mailing
lists, or searching the Web for addresses.
7/15/2019 cybercrime.pptx
15/30
It is technique of pulling out confidential
information from the bank/financial
institutional account holders by deceptive
means.
7/15/2019 cybercrime.pptx
16/30
7/15/2019 cybercrime.pptx
17/30
7/15/2019 cybercrime.pptx
18/30
7/15/2019 cybercrime.pptx
19/30
7/15/2019 cybercrime.pptx
20/30
7/15/2019 cybercrime.pptx
21/30
7/15/2019 cybercrime.pptx
22/30
7/15/2019 cybercrime.pptx
23/30
Law governing cyber space
Cyber law encompasses laws relating to:
Cyber Crimes
Electronic and Digital Signatures
Intellectual Property
Data Protection and Privacy
7/15/2019 cybercrime.pptx
24/30
Penal Code: cyber crimes:
207-A Misuse of a database. Penalty not exceeding two years.
107-B Database destruction. Penalty from three to five years.
207-C Misuse of privileged information. Penalty 5-7 years.
Article 154 Crime of violation of privacy
Article 157 Misuse of computer files
Article 181-A Child Pornography
Article 186 Theft aggravated by electronic funds transfer Article 217 Crimes against Copyright
Article 218 Plagiarism and labor market. Modified articles inthe year 2004, Ley N 27459.
7/15/2019 cybercrime.pptx
25/30
Act N 28493 Law thatregulates the use of unsolicitedcommercial email (SPAM)published on 12.04.05. Spam
is illegal when it does notcontemplate the requirementsestablished in Article No. 6 ofthe Act. (Responsability). Thecompetent authority forviolations is INDECOPI.
7/15/2019 cybercrime.pptx
26/30
Child Pornography; Penal Code Art. 183-A.
Intelectual Property; Penal Code Art. 216, 217, 218, 219,220.
Apology; Penal Code Art. 316. Defamation; Penal Code Art. 223, 224.
Espionage; Penal Code Art. 331.
Manipulation and/or data falsification; Penal Code Art.
427.
7/15/2019 cybercrime.pptx
27/30
First Wave (privacy)
Sweden (1973) ; USA (1974); Federal Republic of German
(1977); Austria, Denmark, France and Norway (1978), etc.
Second Wave (property)
Italy (1978); UK (1981,1990); USA (1980s); Canada andDenmark (1985), etc.
Third Wave (intellectual property)
Convention on Cybercrime
Ensuring that countries adopt procedural laws. Harmonizing national cybercrime law.
7/15/2019 cybercrime.pptx
28/30
Use anti-virus software and firewalls - keep them up to date
Keep your operating system up to date with critical securityupdates and patches
Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Dont use words found in adictionary. Remember that password cracking tools exist
Back-up your computer data on disks or CDs often
7/15/2019 cybercrime.pptx
29/30
Don't share access to your computers with strangers
If you have a wi-fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know this infotoo!
7/15/2019 cybercrime.pptx
30/30
Treat your password like you treat yourtoothbrush. Never give it to anyone else to use,
and change it every few months.