+ All Categories
Home > Documents > cybercrime.pptx

cybercrime.pptx

Date post: 29-Oct-2015
Category:
Upload: patty-aldana
View: 37 times
Download: 0 times
Share this document with a friend
Popular Tags:

of 30

Transcript
  • 7/15/2019 cybercrime.pptx

    1/30

    Patricia aldana

  • 7/15/2019 cybercrime.pptx

    2/30

    Halder and Jaishankar (2011) defines Cybercrimesas: "Offences that are committed against individualsor groups of individuals with a criminal motive tointentionally harm the reputation of the victim orcause physical or mental harm to the victim directlyor indirectly, using modern telecommunicationnetworks such as Internet (Chat rooms, emails,notice boards and groups) and mobile phones(SMS/MMS)".

  • 7/15/2019 cybercrime.pptx

    3/30

    Most of these crimes are not new. Criminalssimply devise different ways to undertake

    standard criminal activities such as fraud, theft,

    blackmail, forgery, and embezzlement using the

    new medium, often involving the Internet

    http://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Thefthttp://en.wikipedia.org/wiki/Blackmailhttp://en.wikipedia.org/wiki/Forgeryhttp://en.wikipedia.org/wiki/Embezzlementhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Embezzlementhttp://en.wikipedia.org/wiki/Forgeryhttp://en.wikipedia.org/wiki/Blackmailhttp://en.wikipedia.org/wiki/Thefthttp://en.wikipedia.org/wiki/Fraud
  • 7/15/2019 cybercrime.pptx

    4/30

    SOME THOUGHTS ABOUT CYBER CRIME

    "The modern thief can steal more with a computerthan with a gun. Tomorrow's terrorist may be able to

    do more damage with a keyboard than with a bomb".

    National Research Council, "Computers at Risk",1991.

  • 7/15/2019 cybercrime.pptx

    5/30

    Computer used to commit a crime

    Child porn, threatening email, assuming someones

    identity, sexual harassment, defamation, spam, phishing

    Computer as a target of a crime

    Viruses, worms, industrial espionage, software piracy,

    hacking, DDoS attacks

  • 7/15/2019 cybercrime.pptx

    6/30

  • 7/15/2019 cybercrime.pptx

    7/30

    Crime againstproperty

    Crime againstGovernment

    Crime againstpersons

  • 7/15/2019 cybercrime.pptx

    8/30

    Cybercrime includes a wide variety of crime

    Offences under cyber crime:

    Offences against the confidentiality integrity and availability

    of computer data and systems

    Content-related offences

    Copyright-related offences

  • 7/15/2019 cybercrime.pptx

    9/30

    Cyber crimes

    Hacking

    Information

    Theft

    E-mail

    bombing

    Salami

    attacks

    Denial of

    Service

    attacks

    Trojan

    attacks

  • 7/15/2019 cybercrime.pptx

    10/30

    Credit card frauds. Cyber pornography.

    Sale of illegal articles-narcotics, weapons, wildlife.

    Online gambling.

    Intellectual Property crimes- software piracy,

    copyright infringement, trademarks violations,

    theft of computer source code.

    Email spoofing.

    Forgery.

    Defamation.

    Cyber stalking.

    Phishing.

    Cyber terrorism.

  • 7/15/2019 cybercrime.pptx

    11/30

    Hacking in simple terms means illegal

    intrusion into a computer system without

    the permission of the computer

    owner/user.

  • 7/15/2019 cybercrime.pptx

    12/30

    Malicious software that attaches itself to other

    software.

    Eg:-

    (viruses, worms, Trojans, Time bomb,Logic Bomb)

  • 7/15/2019 cybercrime.pptx

    13/30

    Spam is the equivalent of physical junk mail and

    unsolicited telemarketing phone calls. It has become one

    of the largest nuisances to computer users for both home

    and business users.

  • 7/15/2019 cybercrime.pptx

    14/30

    Email spam targets individual users with direct mail

    messages. Email spam lists are often created by

    scanning Usenet postings, stealing Internet mailing

    lists, or searching the Web for addresses.

  • 7/15/2019 cybercrime.pptx

    15/30

    It is technique of pulling out confidential

    information from the bank/financial

    institutional account holders by deceptive

    means.

  • 7/15/2019 cybercrime.pptx

    16/30

  • 7/15/2019 cybercrime.pptx

    17/30

  • 7/15/2019 cybercrime.pptx

    18/30

  • 7/15/2019 cybercrime.pptx

    19/30

  • 7/15/2019 cybercrime.pptx

    20/30

  • 7/15/2019 cybercrime.pptx

    21/30

  • 7/15/2019 cybercrime.pptx

    22/30

  • 7/15/2019 cybercrime.pptx

    23/30

    Law governing cyber space

    Cyber law encompasses laws relating to:

    Cyber Crimes

    Electronic and Digital Signatures

    Intellectual Property

    Data Protection and Privacy

  • 7/15/2019 cybercrime.pptx

    24/30

    Penal Code: cyber crimes:

    207-A Misuse of a database. Penalty not exceeding two years.

    107-B Database destruction. Penalty from three to five years.

    207-C Misuse of privileged information. Penalty 5-7 years.

    Article 154 Crime of violation of privacy

    Article 157 Misuse of computer files

    Article 181-A Child Pornography

    Article 186 Theft aggravated by electronic funds transfer Article 217 Crimes against Copyright

    Article 218 Plagiarism and labor market. Modified articles inthe year 2004, Ley N 27459.

  • 7/15/2019 cybercrime.pptx

    25/30

    Act N 28493 Law thatregulates the use of unsolicitedcommercial email (SPAM)published on 12.04.05. Spam

    is illegal when it does notcontemplate the requirementsestablished in Article No. 6 ofthe Act. (Responsability). Thecompetent authority forviolations is INDECOPI.

  • 7/15/2019 cybercrime.pptx

    26/30

    Child Pornography; Penal Code Art. 183-A.

    Intelectual Property; Penal Code Art. 216, 217, 218, 219,220.

    Apology; Penal Code Art. 316. Defamation; Penal Code Art. 223, 224.

    Espionage; Penal Code Art. 331.

    Manipulation and/or data falsification; Penal Code Art.

    427.

  • 7/15/2019 cybercrime.pptx

    27/30

    First Wave (privacy)

    Sweden (1973) ; USA (1974); Federal Republic of German

    (1977); Austria, Denmark, France and Norway (1978), etc.

    Second Wave (property)

    Italy (1978); UK (1981,1990); USA (1980s); Canada andDenmark (1985), etc.

    Third Wave (intellectual property)

    Convention on Cybercrime

    Ensuring that countries adopt procedural laws. Harmonizing national cybercrime law.

  • 7/15/2019 cybercrime.pptx

    28/30

    Use anti-virus software and firewalls - keep them up to date

    Keep your operating system up to date with critical securityupdates and patches

    Don't open emails or attachments from unknown sources

    Use hard-to-guess passwords. Dont use words found in adictionary. Remember that password cracking tools exist

    Back-up your computer data on disks or CDs often

  • 7/15/2019 cybercrime.pptx

    29/30

    Don't share access to your computers with strangers

    If you have a wi-fi network, password protect it

    Disconnect from the Internet when not in use

    Reevaluate your security on a regular basis

    Make sure your employees and family members know this infotoo!

  • 7/15/2019 cybercrime.pptx

    30/30

    Treat your password like you treat yourtoothbrush. Never give it to anyone else to use,

    and change it every few months.