SlideShare uma empresa Scribd logo
1 de 11
Types of Computer Crime Zhuravlev Alexander  326 MSLU
COMPUTER-RELATED CRIME Computer crimes refer to the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. Even identity thefts, misusing devices or electronic frauds are considered to be computer crimes.
Background The increasing range of programmable electronic devices, from set-top TV boxes to mobile phones, means that ‘computer’ crime can affect more than just personal computers (PCs). They and other electronic devices are particularly vulnerable to attack because they are flexible, can be reprogrammed, and are frequently networked with other devices. There are two main ways by which computers can be involved in crime:
Background ,[object Object],telephones. Another example is ‘phishing’ •   New types of crime made possible by specific technologies. One example is denial of service attacks or DoS which prevent computer resources being available to intended users, for example by flooding web servers with more data than they can process. This was done in 2004 by a Russian crime gang in an extortion attempt on UK gambling websites during the 2004 Grand National. The National High Tech Crime Unit (NHTCU) acted with Russian authorities to arrest those responsible
Types of computer–related crime  Hacking: The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities. Kevin Mitnickwas a famous hacker for supposedly hacking into NORAD (the pentagon), though he claims he only looked at minor things such as Nokia and Motorola Vladimir Levin is famous because he allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. He was sentenced to three years in prison and ordered to pay Citibank $240,015 (his share from the heist). Citibank has since begun using the Dynamic Encryption Card, a security system so tight that no other financial institution in the world has it
Types of computer–related crime  Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there Attacks are increasing, with financial services accounting for over 93% of impersonated or hijacked brands through bogus websites and emails. Almost all of the UK’s high street banks have been affected by phishing.
Types of computer–related crime                                                                                                                                                                                                                                   Computer Viruses: These are actually computer programs that are capable of replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from one computer to another through the network, Internet or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law. Virus detections Love LetterThe fastest spreading virus in history appears to have been written by a resident of Manila in the Philippines. Sent via e-mail in May 2000 with "I LOVE YOU" in the subject field, it replicated itself to everyone in the user's Outlook address book and then destroyed local files. Love Letter forced numerous organizations to shut down their e-mail systems, as computer users were far too willing to let love into their lives. The list of viruses includes all detections,  including worms, trojans, and tracking cookies.
Types of computer–related crime  Identity Theft: This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft. Albert Gonzalez of Miami, 28, is charged with acting with two unnamed conspirators to locate large corporations and steal vital account information in a crime that the Department of Justice calls "the single largest hacking and identity theft case ever prosecuted." Authorities say more than 130 million credit and debit card numbers were stolen in a corporate data breach involving three different corporations and two individuals
Types of computer–related crime  Cyberstalking: This is using the Internet to stalk a person just like someone world do in the real world. Here the stalker sends emails, spreads false information or issues threats using the Internet. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered.  A 44 year old publishing executive named Claire Miller was harassed by strangers who were responding to verging-on-pornographic promises someone had made in her name online. These postings included her home address and telephone number.
User awareness User awareness There is limited awareness of computer security among home as well as business users. Inadequately protected computers can be easy targets for unauthorised users. ‘Get Safe Online’ is a joint Government-industry initiative to provide computer security advice. Get Safe Online The Government–industry partnership education initiative ‘Get Safe Online’ is the first national internet-based computer security awareness campaign for the general public and small businesses. The ‘Get Safe Online’ website has 13,000 websites which are linked to it. It provides information to individuals on how to protect themselves, their families or their business from online threats.
Thank You ! Zhuravlev Alexander # 326 MSLU 2009

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 

Semelhante a Types Of Computer Crime

Internet
InternetInternet
Internet
Jodip
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 

Semelhante a Types Of Computer Crime (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Internet
InternetInternet
Internet
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber security
Cyber securityCyber security
Cyber security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 

Mais de Alexander Zhuravlev (8)

Hessen
HessenHessen
Hessen
 
Intellectual property
Intellectual property Intellectual property
Intellectual property
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Technical means of data protection технические средства зашиты информации
Technical means of data protection технические средства зашиты информацииTechnical means of data protection технические средства зашиты информации
Technical means of data protection технические средства зашиты информации
 
Mistral мистраль
Mistral  мистральMistral  мистраль
Mistral мистраль
 
The Medal Of Honor
The Medal Of HonorThe Medal Of Honor
The Medal Of Honor
 
US Constitution
US ConstitutionUS Constitution
US Constitution
 
Privacy and Electronic Communications (EC Directive) Regulations 2003
Privacy and Electronic Communications (EC Directive) Regulations 2003Privacy and Electronic Communications (EC Directive) Regulations 2003
Privacy and Electronic Communications (EC Directive) Regulations 2003
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Types Of Computer Crime

  • 1. Types of Computer Crime Zhuravlev Alexander 326 MSLU
  • 2. COMPUTER-RELATED CRIME Computer crimes refer to the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. Even identity thefts, misusing devices or electronic frauds are considered to be computer crimes.
  • 3. Background The increasing range of programmable electronic devices, from set-top TV boxes to mobile phones, means that ‘computer’ crime can affect more than just personal computers (PCs). They and other electronic devices are particularly vulnerable to attack because they are flexible, can be reprogrammed, and are frequently networked with other devices. There are two main ways by which computers can be involved in crime:
  • 4.
  • 5. Types of computer–related crime Hacking: The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities. Kevin Mitnickwas a famous hacker for supposedly hacking into NORAD (the pentagon), though he claims he only looked at minor things such as Nokia and Motorola Vladimir Levin is famous because he allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. He was sentenced to three years in prison and ordered to pay Citibank $240,015 (his share from the heist). Citibank has since begun using the Dynamic Encryption Card, a security system so tight that no other financial institution in the world has it
  • 6. Types of computer–related crime Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there Attacks are increasing, with financial services accounting for over 93% of impersonated or hijacked brands through bogus websites and emails. Almost all of the UK’s high street banks have been affected by phishing.
  • 7. Types of computer–related crime                                                                                                                                                                                                                               Computer Viruses: These are actually computer programs that are capable of replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from one computer to another through the network, Internet or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law. Virus detections Love LetterThe fastest spreading virus in history appears to have been written by a resident of Manila in the Philippines. Sent via e-mail in May 2000 with "I LOVE YOU" in the subject field, it replicated itself to everyone in the user's Outlook address book and then destroyed local files. Love Letter forced numerous organizations to shut down their e-mail systems, as computer users were far too willing to let love into their lives. The list of viruses includes all detections, including worms, trojans, and tracking cookies.
  • 8. Types of computer–related crime Identity Theft: This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft. Albert Gonzalez of Miami, 28, is charged with acting with two unnamed conspirators to locate large corporations and steal vital account information in a crime that the Department of Justice calls "the single largest hacking and identity theft case ever prosecuted." Authorities say more than 130 million credit and debit card numbers were stolen in a corporate data breach involving three different corporations and two individuals
  • 9. Types of computer–related crime Cyberstalking: This is using the Internet to stalk a person just like someone world do in the real world. Here the stalker sends emails, spreads false information or issues threats using the Internet. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. A 44 year old publishing executive named Claire Miller was harassed by strangers who were responding to verging-on-pornographic promises someone had made in her name online. These postings included her home address and telephone number.
  • 10. User awareness User awareness There is limited awareness of computer security among home as well as business users. Inadequately protected computers can be easy targets for unauthorised users. ‘Get Safe Online’ is a joint Government-industry initiative to provide computer security advice. Get Safe Online The Government–industry partnership education initiative ‘Get Safe Online’ is the first national internet-based computer security awareness campaign for the general public and small businesses. The ‘Get Safe Online’ website has 13,000 websites which are linked to it. It provides information to individuals on how to protect themselves, their families or their business from online threats.
  • 11. Thank You ! Zhuravlev Alexander # 326 MSLU 2009