2. Cybercrime is a term for any illegal activity that uses a computer as
its primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity
that uses a computer for the storage of evidence.
What Is Cyber Crime ?
4. Phishing is the practice of sending
fraudulent emails in an attempt to
trick the recipient, usually for the
purpose of obtaining money. The
elderly are particularly vulnerable to
these types of cyber crime.
5. Hacking is similar to digital trespassing.
Hackers infiltrate online networks to
illegally download confidential information,
manipulate functions and in some cases
steal identities that can be used to
fraudulently purchase goods online.
6. Not all types of cyber crime involve
money. Some cyber criminals use the
Internet as a cover for other illegal
behaviors like stalking, harassment
and in lesser cases, bullying.
7. Spam, or the unsolicited sending of bulk
email for commercial purposes, is unlawful
in some jurisdictions. While anti-spam laws
are relatively new, limits on unsolicited
electronic communications have existed for
some time.
8. Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss.
9. The content of websites and
other electronic communications
may be distasteful, obscene or
offensive for a variety of reasons.
In some instances these
communications may be illegal.
10. 1. Loss Of Revenue
2. Wasted Time
3. Damaged Reputations
4. Reduced Productivity
11. One of the main effects of cyber crime on a
company is a loss of revenue. This loss can
be caused by an outside party who obtains
sensitive financial information, using it to
withdraw funds from an organization. It can
also occur when a business's e-commerce
site becomes compromised-while
inoperable, valuable income is lost when
consumers are unable to use the site.
12. Another major effect or consequence of
cyber crime is the time that is wasted when
IT personnel must devote great portions of
their day handling such incidences. Rather
than working on productive measures for an
organization, many IT staff members spend
a large percentage of their time handling
security breaches and other problems
associated with cyber crime.
13. In cases where customer records are
compromised by a security breach
associated with cyber crime, a company's
reputation can take a major hit. Customers
whose credit cards or other financial data
become intercepted by hackers or other
infiltrators lose confidence in an
organization and often begin taking their
business elsewhere.
14. Due to the measures that many companies
must implement to counteract cyber
crime, there is often a negative effect on
employees' productivity. This is
because, due to security
measures, employees must enter more
passwords and perform other time-
consuming acts in order to do their jobs.
Every second wasted performing these tasks
is a second not spent working in a
productive manner.
15. 1. Ease of Anonymity
2. Holding a Grudge
3. Thrill of the Game
16. Computer crime has risen at an astronomical
rate, in large part due to the ease with which a
perpetrator can remain undetected or
anonymous. It is much easier to get away with
criminal activity in a cyber world than in the
real world. However, the ability to track IP
network addresses is becoming greater all the
time, making it harder to remain invisible
when online. Still, there is a strong sense of
anonymity that can draw otherwise respectable
citizens to abandon their ethics in pursuit of
personal gain.
17. Malicious computer codes like worms
and viruses are often spread by someone
who is seeking to cause harm to an
individual or company--possibly over
losing a job, perceived unethical business
conduct or maybe even jealousy or envy.
Such parties intend to destroy or cripple
their targets for the personal satisfaction
of seeing them suffer the effects.
18. For many computer criminals, the excitement
and challenge of exploiting a computer system
can be too great to resist. Computer gurus are
notorious for gleaning information about
specific networks and software designs that
they have an irresistible urge to put to a test.
Unfortunately, much of this information
translates into illegally compromising
computer systems in one way or another. Still,
the lure of "cracking the code" will continue to
be a major factor in enticing some to commit
computer crimes.
20. Do not provide personal details online to
people you have never met. This
concept is simple; you do not usually
give your personal information to a
stranger you met on the street. The
same rules apply on the Internet. When
you are required to provide some basic
information ensure that you are doing
so at trusted websites. However, never
reply to emails from unknown senders
asking you for personal information.
Never provide your online banking
information online to anyone.
21. Protect your computer from hackers
and malware by installing a
firewall, anti-virus software, and anti-
spyware software. Beware of free anti-
spyware software as some of these will
automatically install malware on your
computer. Download these programs
from trusted websites. Keep your anti-
virus software up-to-date by updating
the latest virus definitions regularly.
22. Check the terms of use when
installing new software on your
computer. Be extra cautious when
installing free software downloaded
from the Internet. Many of these
apparently "free" programs come
with hidden programs that install
malware on your computer without
your knowledge.
23. Keep your Internet browser up-to-
date. Security threats are discovered
on a daily basis. Always install the
latest version on your computer.
Update your operating system and
other software installed on your
computer with the latest security
patches and updates.
24. Make online payments only on
website that have an encrypted
connection. Websites that have a
security certificate start with
"https://" and not "http://". You
can verify whether the website is
secure by looking for the small
padlock icon in your browser
window.
25. Computer crime isn’t victimless. Millions of people lose money to ruthless cyber
criminals every year, and some are actually physically harmed by people they
meet online. When you’re using the Web, remember to stay alert, stay aware and
protect your information.
The threat of cyber crime is real, so act accordingly
26. Say No To Cyber Crime !!
The End
Thank You
Bushra