Cyber crime final
-
Upload
zeeshan-ahmed -
Category
Social Media
-
view
60 -
download
0
Transcript of Cyber crime final
Cyber Crime
“What is Crime”Harmful act against the public which the
State wishes to prevent, and is punishable by fine, imprisonment, and/or death.
Examples
Computer Crime or Cyber Crime
Crime that involves a Computer and a Network.
Purposes of Cyber CrimeStealing a person’s identityMaking MoneyHarassing SomeoneGetting Secret Records or PasswordsAssessing someone personal Data
Categories of Cyber CrimeComputer as a Weapon; using a Computer to
commit real World Crime.Computer as a Target; using a Computer to
attack on other Computer
Classification of Cyber Crime Against Person
i. Hackingii. Harassment
Against Propertyi. Intellectual property crimesii. Hacking Computer System
Against Governmenti. Cyber Terrorismii. Information
Types of Cyber CrimesHackingComputer VandalismCyber TerrorismSoftware Privacy
Hacking Crime wherein a person’s computer is broken into so
that his personal or sensitive information can be accessed
Also known as Cracking.Government websites are the hot targets of hackers.
Computer Vandalism
Damaging or destroying the data rather than stealing or misusing
Transmitting Viruses; These are the programs that attach themselves to a file and then circulate from one computer to other.
Cyber TerrorismThe politically motivated use of computers
and information technology to cause severe disruption or widespread fear.
Using Computer and Network to spread fear in among civilians.
Software Privacy Illegal copying, distribution, or use
of softwareAccording to the Business Software Alliance
(BSA), about 36% of all software in current use is stolen.
Built to protect the privacy of its users
Safety Tips
Safety Tips To CybercrimeUse Antivirus Software’sUninstall Unnecessary SoftwareMaintain backup Check security settingsNever give your full name or address to
strangers.
Security
Advantages of Cyber Security
This Security will defend us from critical attacks
Helps us to browse the safe websiteSecure all the incoming and outgoing data on
our computer
THANKS FOR WATCHING