SlideShare a Scribd company logo
1 of 23
COMPUTER CRIMES TOP 5
5
Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
4
Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
3
Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
2
Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
1
Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
“Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 
Thank You 

More Related Content

What's hot (20)

Cyber threats
Cyber threatsCyber threats
Cyber threats
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Viewers also liked

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talagaMar Soriano
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1Mar Soriano
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2Mar Soriano
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talagaMar Soriano
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOYMar Soriano
 

Viewers also liked (9)

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Robot Teacher
Robot TeacherRobot Teacher
Robot Teacher
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 

Similar to Top 5 Computer Crimes

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 

Similar to Top 5 Computer Crimes (20)

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security
Mobile securityMobile security
Mobile security
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Information security
Information securityInformation security
Information security
 

More from Mar Soriano

Windows evolution
Windows evolutionWindows evolution
Windows evolutionMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryMar Soriano
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphoneMar Soriano
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1Mar Soriano
 
Space elevator sarah final
Space elevator sarah finalSpace elevator sarah final
Space elevator sarah finalMar Soriano
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can rideMar Soriano
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can rideMar Soriano
 
Robot teacher123final na
Robot teacher123final naRobot teacher123final na
Robot teacher123final naMar Soriano
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 

More from Mar Soriano (20)

Windows evolution
Windows evolutionWindows evolution
Windows evolution
 
FLYING CAR
FLYING CARFLYING CAR
FLYING CAR
 
Google’s Car
Google’s CarGoogle’s Car
Google’s Car
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Water mill
Water millWater mill
Water mill
 
Transformer1
Transformer1Transformer1
Transformer1
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatory
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Transformer1
Transformer1Transformer1
Transformer1
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphone
 
Jean
JeanJean
Jean
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
Space elevator sarah final
Space elevator sarah finalSpace elevator sarah final
Space elevator sarah final
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
Robot teacher123final na
Robot teacher123final naRobot teacher123final na
Robot teacher123final na
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Top 5 Computer Crimes

  • 2.
  • 3. 5
  • 4. Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
  • 5. Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
  • 6. Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
  • 7.
  • 8. 4
  • 9. Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
  • 10. In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
  • 11.
  • 12. 3
  • 13. Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
  • 14. Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
  • 15.
  • 16. 2
  • 17. Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
  • 18.
  • 19. 1
  • 20. Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
  • 21.
  • 22. “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 