SlideShare uma empresa Scribd logo
1 de 24
COMPUTER CRIME AND
INTERNET CRIME
PRIVACY
BY
KINGMAKERS…
WHAT IS COMPUTER CRIME ALL ABOUT?
Computer crime is any crime
committed with the help of a
computer. More specifically, it entails
an ever-growing series of categories
detailing specific wrongdoing
facilitated by a computer. With the
Internet attaining ever more critical
importance in society and our use of
computers evolving by the day,
computer crimes constitute some of
the most serious law enforcement
concerns in existence.
HISTORY OF COMPUTER CRIME
Every field of study and expertise develops a common
body of knowledge that distinguishes professionals from
amateurs. One element of that body of knowledge is a
shared history of significant events that have shaped the
development of the field. Newcomers to the field
benefit from learning the names and significant events
associated with their field so that they can understand
references from more senior people in the profession
and so that they can put new events and patterns into
perspective. This paper provides a brief overview of
some of the more famous (or notorious) cases of
computer crime (including those targeting computers
and those mediated through computers) of the last four
decades.
OVERVIEWS
•In the early decades of modern information
technology (IT), computer crimes were largely
committed by individual disgruntled and dishonest
employees.
•Physical damage to computer systems was a
prominent threat until the 1980s.
•Criminals often used authorized access to subvert
security systems as they modified data for financial
gain or destroyed data for revenge.
•Early attacks on telecommunications systems in the
1960s led to subversion of the long-distance phone
systems for amusement and for theft of services.
•As telecommunications technology spread
throughout the IT world, hobbyists with criminal
tendencies learned to penetrate systems and
networks.
•Programmers in the 1980s began writing malicious
software, including self-replicating programs, to
interfere with personal computers.
OVERVIEWS
• As the Internet increased access to
increasing numbers of systems worldwide,
criminals used unauthorized access to
poorly protected systems for vandalism,
political action and financial gain.
• As the 1990s progressed, financial crime
using penetration and subversion of
computer systems increased.
• The types of malware shifted during the
1990s, taking advantage of new
vulnerabilities and dying out as operating
systems were strengthened, only to
succumb to new attack vectors.
• Illegitimate applications of e-mail grew
rapidly from the mid-1990s onward,
generating torrents of unsolicited
commercial and fraudulent e-mail.
CATEGORIES OF COMPUTER CRIME
COMPUTER VIRUSES
A computer virus is a computer
program that can replicate
itself and spread from one
computer to another. The term
"virus" is also commonly, but
erroneously, used to refer to other
types of malware, including but not
limited
to adware and spyware programs
that do not have a reproductive
ability.
DENIAL - OF - SERVICE ATTACK
In computing, a denial-of-service
attack (DoS attack) or distributed
denial-of-service attack (DDoS attack)
is an attempt to make a machine or
network resource unavailable to its
intended users. Although the means
to carry out, motives for, and targets
of a DoS attack may vary, it generally
consists of the efforts of one or more
people to temporarily or indefinitely
interrupt or suspend services of
a host connected to the Internet.
MALWARES
Malware, short for malicious (or
malevolent) software, is software
used or created by attackers to
disrupt computer operation,
gather sensitive information, or
gain access to private computer
systems. It can appear in the form
of code, scripts, active content,
and other software. 'Malware' is a
general term used to refer to a
variety of forms of hostile or
intrusive software.
HOW TO PROTECT
YOURSELF
•The best known bit of advice is this: Never
open any attachment unless you know who
it's from and why they are sending it.
Refusing to open unsolicited e-mail of any
kind is the only sure-fire way to sidestep all
forms of trouble.
•Anti-virus software is crucial to preventing
virus attacks, but this strategy only works if
users update their software. Unfortunately,
'keeping it current' means updating it
weekly, at least but most products today
allow one to automate this process, but file
downloads can be large and slow.
HOW TO PROTECT
YOURSELF
•Common sense is another good weapon in the
fight against viruses. Be wary of opening any
email attachments, even from your friends,
especially if it has been forwarded to them. Set
up your anti-virus product so that it
automatically scans incoming e-mail and
avoiding e-mail software that allows automatic
launching of attachments.
•If all of this sounds like a lot of work, it is.
There is always a tradeoff between ease of use
and security but the extra time you spend
updating your anti-virus software now will save
you hours of time and buckets of frustration
later. If you don't keep it updated, you might
was well be completely unprotected.
PREVENTION OF
COMPUTER CRIMES
•Be sure do a full back up of your system on a regular
basis.
•Always use an anti-virus software program, one with
both an on-demand and an on-access scanner.
•Update the virus database in your anti-virus program
regularly.
•On a PC, change the CMOS setting of your boot up
process from booting first on the A drive (floppy) and then
on the C drive (hard drive) to just booting on the C drive.
•Don't allow your web browser to automatically run
programs, such as MS Word or other programs through its
e-mail program.
•Configure your web browsers to disable ActiveX, Java,
and JavaScript.
•Know that the only way a virus spreads is either by
launching an infected file or by booting an infected disk.
•Using an updated anti-virus program, scan all new
software for viruses before installing them on your hard
drive.
NET CRIME
Net crime refers to criminal
exploitation of the Internet.
Crime on the Net takes many
forms including hacking, viruses,
fraud, scams, money laundering,
industrial espionage, prostitution,
certain forms of gambling, drug use,
drug smuggling, suicide assistance,
defamatory allegations, cyber
stalking, cyber terrorism, actual
terrorism.
CATEGORIES OF NET CRIME
HACKING VIRUSES PIRATING
CATEGORIES OF NET CRIME
ILLEGAL
TRADING
CYBER
TERRORISM
PORNOGRAPHY
HACKING
Hacking can take several forms:
•Accessing - entering a network which is
intended to be private
•Defacing – changing the content of another
person’s Web site
•Hijacking – redirecting elsewhere anyone
trying to access a particular Web site
•Bombing – overwhelming a site with
countless messages to slow down or even
crash the server
•Denial of service – running a program
which sends thousands of requests to a site
simultaneously, frequently from more than
one source, so that the relevant server
slows down considerably or preferably
(from the point of view of the hacker)
crashes.
VIRUSES
Viruses, in the broadest sense, come in three
forms:
•Virus: This is a code that attaches itself to a
program in a computer and then reproduces
itself. It can erase files or lock up a system.
•Worm: This is similar to a virus but does not
attach itself to files or programs in a
computer. This leaves it free to spread
through a network on its own.
•Trojan horse: This is a program that
performs malicious actions while pretending
to do something else. It is similar to a virus
but does not try to reproduce itself.
PIRATING
Digital technology makes it very easy to
copy perfectly creative products such
as music or films and the Internet
provides a free and almost anonymous
means of transmitting or exchanging
this pirated material around the world.
The favored means of making such
material available is peer-to-peer file-
sharing applications. Originally the
main problem was with music in the
form of MP3 files exchanged through
sites such as Napster.
ILLEGAL TRADING
•Illegal trading on the Internet uses chat rooms,
bulletin boards, newsgroups and Web sites. The
arrangements can take various forms:
•A manufacturer with a legitimate order to
produce goods for a well-known company can
deliberately over-run the volume of the order
and sell the excessive items at lower prices in
other markets.
•The same goods - such as drugs or drinks - may
be sold in different markets at different prices in
a process known as 'parallel trading'.
•There is frequently straightforward
counterfeiting of well-known brand goods, with
40% of cigarettes and 10% of cosmetics and
perfumes sold world-wide believed to be fake.
CYBER TERRORISM
Cyber terrorism is the use
of Internet based attacks
in terrorist activities, including
acts of deliberate, large-scale
disruption of computer
networks, especially of
personal computers attached
to the Internet, by the means
of tools such as computer
viruses.
PORNOGRAPHY
Internet pornography is pornography that is
accessible over the Internet, primarily
via websites, peer-to-peer file sharing,
or Usenet newsgroups. While pornography
had been available over the Internet since the
1980s, it was the availability of widespread
public access to the World Wide Web in 1991
that led to an expansion of Internet
pornography.
The Internet enables people to access
pornography more or less anonymously and
to view it in the comfort and privacy of their
homes. It also allows access to pornography
by people whose access is otherwise
restricted for legal or social reasons, such as
children.
PREVENTION OF NET-CRIME
1. Install anti-spyware and antivirus
software.
2. Turn on your firewall.
3. Monitor the websites your children
go to.
4. Talk with your children about
online predators.
5. Go to the FBI website to learn
about internet scams.
6. Use secured websites when
purchasing items online and giving
credit card numbers.
7. Report suspected internet crimes.
CONCLUSION
While this document focuses on how to
investigate computer crime, how to properly extract
information, and understanding computer laws, the
hope is that readers will understand that even non-
computer crimes might still involve computer and
Internet resources. Overlooking this deprives law-
enforcement officers and agencies of a very
valuable investigative tool. After reading this
chapter, not only should you be aware of the scope
of computer crimes, you should also be aware that
even if a crime is not itself a computer crime, there
could be a computer or Internet element to the
crime. For example, a drug dealer might use e-mail
to arrange sales and purchases, a prostitute and
pimp might use Craigslist to facilitate their trade,
and a social-networking site can provide clues as to
the motive in a violent crime.
Computer crime and internet crime privacy

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimePsychoticBanda
 

Mais procurados (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 

Destaque

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
Law And Ethics
Law And EthicsLaw And Ethics
Law And Ethicswindleh
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Ethics and law
Ethics and lawEthics and law
Ethics and lawjayson
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethics & value s ppt
Ethics & value s ppt Ethics & value s ppt
Ethics & value s ppt Babasab Patil
 

Destaque (20)

WHAT ABOUT COMPUTER
WHAT ABOUT COMPUTERWHAT ABOUT COMPUTER
WHAT ABOUT COMPUTER
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Parts of the computer
Parts of the computerParts of the computer
Parts of the computer
 
Islamic ethics
Islamic ethicsIslamic ethics
Islamic ethics
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
law and ethics
law and ethicslaw and ethics
law and ethics
 
Ethics in Islam
Ethics in IslamEthics in Islam
Ethics in Islam
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Law and ethics
Law and ethicsLaw and ethics
Law and ethics
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Islamic Ethics
Islamic EthicsIslamic Ethics
Islamic Ethics
 
Law And Ethics
Law And EthicsLaw And Ethics
Law And Ethics
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Islamic Ethics
Islamic Ethics Islamic Ethics
Islamic Ethics
 
Ethics and law
Ethics and lawEthics and law
Ethics and law
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Ethics & value s ppt
Ethics & value s ppt Ethics & value s ppt
Ethics & value s ppt
 

Semelhante a Computer crime and internet crime privacy

Semelhante a Computer crime and internet crime privacy (20)

Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
C3
C3C3
C3
 
cyber crime
cyber crime cyber crime
cyber crime
 
computer viruses
computer virusescomputer viruses
computer viruses
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
anti_virus
anti_virusanti_virus
anti_virus
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Último

Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 

Último (20)

Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 

Computer crime and internet crime privacy

  • 1. COMPUTER CRIME AND INTERNET CRIME PRIVACY BY KINGMAKERS…
  • 2. WHAT IS COMPUTER CRIME ALL ABOUT? Computer crime is any crime committed with the help of a computer. More specifically, it entails an ever-growing series of categories detailing specific wrongdoing facilitated by a computer. With the Internet attaining ever more critical importance in society and our use of computers evolving by the day, computer crimes constitute some of the most serious law enforcement concerns in existence.
  • 3. HISTORY OF COMPUTER CRIME Every field of study and expertise develops a common body of knowledge that distinguishes professionals from amateurs. One element of that body of knowledge is a shared history of significant events that have shaped the development of the field. Newcomers to the field benefit from learning the names and significant events associated with their field so that they can understand references from more senior people in the profession and so that they can put new events and patterns into perspective. This paper provides a brief overview of some of the more famous (or notorious) cases of computer crime (including those targeting computers and those mediated through computers) of the last four decades.
  • 4. OVERVIEWS •In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. •Physical damage to computer systems was a prominent threat until the 1980s. •Criminals often used authorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. •Early attacks on telecommunications systems in the 1960s led to subversion of the long-distance phone systems for amusement and for theft of services. •As telecommunications technology spread throughout the IT world, hobbyists with criminal tendencies learned to penetrate systems and networks. •Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers.
  • 5. OVERVIEWS • As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain. • As the 1990s progressed, financial crime using penetration and subversion of computer systems increased. • The types of malware shifted during the 1990s, taking advantage of new vulnerabilities and dying out as operating systems were strengthened, only to succumb to new attack vectors. • Illegitimate applications of e-mail grew rapidly from the mid-1990s onward, generating torrents of unsolicited commercial and fraudulent e-mail.
  • 7. COMPUTER VIRUSES A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 8. DENIAL - OF - SERVICE ATTACK In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 9. MALWARES Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.
  • 10. HOW TO PROTECT YOURSELF •The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble. •Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software. Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.
  • 11. HOW TO PROTECT YOURSELF •Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your friends, especially if it has been forwarded to them. Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments. •If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later. If you don't keep it updated, you might was well be completely unprotected.
  • 12. PREVENTION OF COMPUTER CRIMES •Be sure do a full back up of your system on a regular basis. •Always use an anti-virus software program, one with both an on-demand and an on-access scanner. •Update the virus database in your anti-virus program regularly. •On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. •Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. •Configure your web browsers to disable ActiveX, Java, and JavaScript. •Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. •Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive.
  • 13. NET CRIME Net crime refers to criminal exploitation of the Internet. Crime on the Net takes many forms including hacking, viruses, fraud, scams, money laundering, industrial espionage, prostitution, certain forms of gambling, drug use, drug smuggling, suicide assistance, defamatory allegations, cyber stalking, cyber terrorism, actual terrorism.
  • 14. CATEGORIES OF NET CRIME HACKING VIRUSES PIRATING
  • 15. CATEGORIES OF NET CRIME ILLEGAL TRADING CYBER TERRORISM PORNOGRAPHY
  • 16. HACKING Hacking can take several forms: •Accessing - entering a network which is intended to be private •Defacing – changing the content of another person’s Web site •Hijacking – redirecting elsewhere anyone trying to access a particular Web site •Bombing – overwhelming a site with countless messages to slow down or even crash the server •Denial of service – running a program which sends thousands of requests to a site simultaneously, frequently from more than one source, so that the relevant server slows down considerably or preferably (from the point of view of the hacker) crashes.
  • 17. VIRUSES Viruses, in the broadest sense, come in three forms: •Virus: This is a code that attaches itself to a program in a computer and then reproduces itself. It can erase files or lock up a system. •Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own. •Trojan horse: This is a program that performs malicious actions while pretending to do something else. It is similar to a virus but does not try to reproduce itself.
  • 18. PIRATING Digital technology makes it very easy to copy perfectly creative products such as music or films and the Internet provides a free and almost anonymous means of transmitting or exchanging this pirated material around the world. The favored means of making such material available is peer-to-peer file- sharing applications. Originally the main problem was with music in the form of MP3 files exchanged through sites such as Napster.
  • 19. ILLEGAL TRADING •Illegal trading on the Internet uses chat rooms, bulletin boards, newsgroups and Web sites. The arrangements can take various forms: •A manufacturer with a legitimate order to produce goods for a well-known company can deliberately over-run the volume of the order and sell the excessive items at lower prices in other markets. •The same goods - such as drugs or drinks - may be sold in different markets at different prices in a process known as 'parallel trading'. •There is frequently straightforward counterfeiting of well-known brand goods, with 40% of cigarettes and 10% of cosmetics and perfumes sold world-wide believed to be fake.
  • 20. CYBER TERRORISM Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 21. PORNOGRAPHY Internet pornography is pornography that is accessible over the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups. While pornography had been available over the Internet since the 1980s, it was the availability of widespread public access to the World Wide Web in 1991 that led to an expansion of Internet pornography. The Internet enables people to access pornography more or less anonymously and to view it in the comfort and privacy of their homes. It also allows access to pornography by people whose access is otherwise restricted for legal or social reasons, such as children.
  • 22. PREVENTION OF NET-CRIME 1. Install anti-spyware and antivirus software. 2. Turn on your firewall. 3. Monitor the websites your children go to. 4. Talk with your children about online predators. 5. Go to the FBI website to learn about internet scams. 6. Use secured websites when purchasing items online and giving credit card numbers. 7. Report suspected internet crimes.
  • 23. CONCLUSION While this document focuses on how to investigate computer crime, how to properly extract information, and understanding computer laws, the hope is that readers will understand that even non- computer crimes might still involve computer and Internet resources. Overlooking this deprives law- enforcement officers and agencies of a very valuable investigative tool. After reading this chapter, not only should you be aware of the scope of computer crimes, you should also be aware that even if a crime is not itself a computer crime, there could be a computer or Internet element to the crime. For example, a drug dealer might use e-mail to arrange sales and purchases, a prostitute and pimp might use Craigslist to facilitate their trade, and a social-networking site can provide clues as to the motive in a violent crime.