SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Cyber Crime
Contents
No. Topic
1. Introduction
2. History of cyber crime
3. Definition
4. Categories of cyber crime
5. Types of cyber crime
6. Cyber criminals
7. Prevention
8. Conclusion
9. Reference
Introduction
 The internet in Malaysia is growing rapidly. It has
given rise to new opportunities in every field such
as entertainment, business, sports and
education.
 There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime.
History of cybercrime
 The first recorded cyber crime took place in the
year 1820
 In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom.
 This device allowed the repetition of a series of
steps in the weaving of special fabrics.
 This resulted in a fear amongst Jacquard's
employees that their traditional employment and
livelihood were being threatened.
 They committed acts of sabotage to discourage
Jacquard from further use of the new technology.
This is the first recorded cyber crime!
Definition
Offences that are committed by using modern
telecommunication networks such as Internet
and mobile phone as a subject to steal a
person’s identity or illegal imports or malicious
programs
Categories of Cyber Crime
 The Computer as a Target :
>using a computer to attack other computers.
 The computer as a weapon :
>using a computer to commit real
world crimes.
20%
25%
27%
71%
79%
85%
11%
17%
Types of Cyber Crime
Theft of proprietary
information
System penetration
from outside
Denial service
Unauthorized access
of insiders
Employee abuse of
internet privilage
Viruses
Financial Fraud
Sabotage of
data/networks
Cyber Crime
Cyber Criminals
 Kids (age group 9-16 etc.)
 Organized hacktivists
 Disgruntled employees
 Professional hackers (corporate espionage)
Safety tips for Cyber Crime
 Use antivirus software’s
 Insert firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Never give your identity to strangers
Conclusion
Within the law enforcement agencies, a
set of rules must be developed
to address the various categories of
computer crime.
As such, investigators will know what
and which materials to search the
electronic evidence to recover, and the
chain of custody to maintain .
Reference
 http://books.google.co.uk/books?id=gsWQ-
xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=
%22threats%20to%20harm%22%20cybercrime&
pg=PA91#v=onepage&q=harm&f=false
 http://says.com/my/news/malaysia-sixth-most-
vulnerable-to-cyber-crime
 http://says.com/my/news/malaysia-sixth-most-
vulnerable-to-cyber-crime
THE END

Mais conteúdo relacionado

Mais procurados (17)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
Digital security
Digital securityDigital security
Digital security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
 
Mobile security
Mobile securityMobile security
Mobile security
 

Destaque

Internet for Development
Internet for DevelopmentInternet for Development
Internet for DevelopmentRoberto Polillo
 
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)nurul ain
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]jsoni2
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
History & Basic Structure of the Internet
History & Basic Structure of the InternetHistory & Basic Structure of the Internet
History & Basic Structure of the InternetVilla Santa Maria
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentationdgieseler1
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the InternetMike Crabb
 

Destaque (13)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
 
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
History & Basic Structure of the Internet
History & Basic Structure of the InternetHistory & Basic Structure of the Internet
History & Basic Structure of the Internet
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
cyber crime
cyber crimecyber crime
cyber crime
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
 

Semelhante a Cyber Crime

Semelhante a Cyber Crime (20)

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 

Cyber Crime

  • 2. Contents No. Topic 1. Introduction 2. History of cyber crime 3. Definition 4. Categories of cyber crime 5. Types of cyber crime 6. Cyber criminals 7. Prevention 8. Conclusion 9. Reference
  • 3. Introduction  The internet in Malaysia is growing rapidly. It has given rise to new opportunities in every field such as entertainment, business, sports and education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime.
  • 4. History of cybercrime  The first recorded cyber crime took place in the year 1820  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.  This device allowed the repetition of a series of steps in the weaving of special fabrics.
  • 5.  This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened.  They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 6. Definition Offences that are committed by using modern telecommunication networks such as Internet and mobile phone as a subject to steal a person’s identity or illegal imports or malicious programs
  • 7. Categories of Cyber Crime  The Computer as a Target : >using a computer to attack other computers.  The computer as a weapon : >using a computer to commit real world crimes.
  • 8. 20% 25% 27% 71% 79% 85% 11% 17% Types of Cyber Crime Theft of proprietary information System penetration from outside Denial service Unauthorized access of insiders Employee abuse of internet privilage Viruses Financial Fraud Sabotage of data/networks
  • 10. Cyber Criminals  Kids (age group 9-16 etc.)  Organized hacktivists  Disgruntled employees  Professional hackers (corporate espionage)
  • 11. Safety tips for Cyber Crime  Use antivirus software’s  Insert firewalls  Uninstall unnecessary software  Maintain backup  Check security settings  Never give your identity to strangers
  • 12. Conclusion Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search the electronic evidence to recover, and the chain of custody to maintain .