SlideShare uma empresa Scribd logo
1 de 12
Computer Crime and Safety
Measure
1
Purushottam Dahal
BIM,HSM
www.purushottamdahal.com.np
Content
1. Computer Crime
2. Software Piracy
3. Anti Piracy
4. Computer Virus, Worm, Spyware
5. Ethical Issues in Computer
6. Cyber Law
7. Network Security
8. Data and message security
5/23/2016
2
Computer Crime
 Computer crime describes a very broad category of offenses.
 Some of them are the same as non-computer offenses, such as larceny or fraud, except that a computer
or the Internet is used in the commission of the crime.
 Others, like many forms of hacking, are uniquely related to computers.
5/23/2016
3
Computer crime laws in many states prohibit a person from performing certain acts without authorization,
including:
 Improperly accessing a computer, system, or network;
 Modifying, damaging, using, disclosing, copying, or taking programs or data;
 Introducing a virus or other contaminant into a computer system;
 Using a computer in a scheme to defraud;
 Interfering with someone else's computer access or use;
 Using encryption in aid of a crime;
 Falsifying e-mail source information; and
 Stealing an information service from a provider.
5/23/2016
4
Software Piracy
 The unauthorized copying of software. Most retail programs are licensed for use at just one computer site
or for use by only one user at any time.
 By buying the software, you become a licensed user rather than an owner. You are allowed to make
copies of the program for backup purposes, but it is against the law to give copies to friends and
colleagues.
 Software piracy is all but impossible to stop, although software companies are launching more and more
lawsuits against major infractors.
 Originally, software companies tried to stop software piracy by copy-protecting their software. This
strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most
software now requires some sort of registration, which may discourage would-be pirates, but doesn't
really stop software piracy.
5/23/2016
5
Anti Piracy
 Designed to prevent the unauthorized use or reproduction of copyright material.
5/23/2016
6
Computer virus
 A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other
programs by modifying them.
 Infecting computer programs can include as well, data files, or the boot sector of the hard drive.
5/23/2016
7
Worm
 A computer worm is a standalone malware computer program that replicates itself in order to spread to
other computers.
 Often, it uses a computer network to spread itself, relying on security failures on the target computer to
access it.
 Unlike a computer virus, it does not need to attach itself to an existing program.
5/23/2016
8
Spyware
 Spyware is software that aims to gather information about a person or organization without their
knowledge and that may send such information to another entity without the consumer's consent, or that
asserts control over a computer without the consumer's knowledge.
 "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies.
 Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web
and serving up pop-up ads to Internet users.
5/23/2016
9
Cyber law
 Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.
 It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many
areas of law and regulation.
5/23/2016
10
Network security
 Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
 Network security involves the authorization of access to data in a network, which is controlled by the
network administrator.
5/23/2016
11
5/23/2016
12

Mais conteúdo relacionado

Mais procurados

Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising Mohd Arif
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiMatthew J McMahon
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guideManage IT Africa
 
Spyware, spying software, computer spying
Spyware, spying software, computer spying Spyware, spying software, computer spying
Spyware, spying software, computer spying Ashish kumar Bhardwaj
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 

Mais procurados (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Introduction to malvertising
Introduction to malvertising Introduction to malvertising
Introduction to malvertising
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
spyware
spyware spyware
spyware
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Malware
MalwareMalware
Malware
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
 
Spyware
SpywareSpyware
Spyware
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Spyware
SpywareSpyware
Spyware
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
 
Spyware, spying software, computer spying
Spyware, spying software, computer spying Spyware, spying software, computer spying
Spyware, spying software, computer spying
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 

Destaque

Starting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of TechnologyStarting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of Technologyejl2
 
Safety In Using Computer
Safety In  Using  ComputerSafety In  Using  Computer
Safety In Using ComputerKMon Vee
 
(C) Etiquette @ Work
(C)   Etiquette @ Work(C)   Etiquette @ Work
(C) Etiquette @ WorkAmit Rastogi
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Professional Etiquette And Do Donts
Professional Etiquette And Do DontsProfessional Etiquette And Do Donts
Professional Etiquette And Do DontsSouvik Santra
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquetteRachel Weber
 

Destaque (7)

Starting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of TechnologyStarting the Discussions with Students about Safe and Ethical Use of Technology
Starting the Discussions with Students about Safe and Ethical Use of Technology
 
Safety In Using Computer
Safety In  Using  ComputerSafety In  Using  Computer
Safety In Using Computer
 
(C) Etiquette @ Work
(C)   Etiquette @ Work(C)   Etiquette @ Work
(C) Etiquette @ Work
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Professional Etiquette And Do Donts
Professional Etiquette And Do DontsProfessional Etiquette And Do Donts
Professional Etiquette And Do Donts
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 

Semelhante a Computer Crime and Safety Measure

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxChaitanyaMundra2
 
Internet security
Internet securityInternet security
Internet securityat1211
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

Semelhante a Computer Crime and Safety Measure (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Network security
Network securityNetwork security
Network security
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Computer security
Computer securityComputer security
Computer security
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Internet security
Internet securityInternet security
Internet security
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Hamza
HamzaHamza
Hamza
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 

Mais de Purushottam Dahal

Mais de Purushottam Dahal (20)

Australia's Successful Industries
Australia's Successful IndustriesAustralia's Successful Industries
Australia's Successful Industries
 
Data Processing and Database
Data Processing and DatabaseData Processing and Database
Data Processing and Database
 
Network and Communication
Network and CommunicationNetwork and Communication
Network and Communication
 
Multimedia
MultimediaMultimedia
Multimedia
 
Computer system Development
Computer system Development Computer system Development
Computer system Development
 
Introduction to the Internet
Introduction to the Internet Introduction to the Internet
Introduction to the Internet
 
Programming Language
Programming LanguageProgramming Language
Programming Language
 
Introduction to computer System
Introduction to computer SystemIntroduction to computer System
Introduction to computer System
 
Ex net
Ex netEx net
Ex net
 
Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.Mozilla Nepal Maker Party 2015, Hetauda.
Mozilla Nepal Maker Party 2015, Hetauda.
 
Administering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumesAdministering volume sets and raid arrays using volumes
Administering volume sets and raid arrays using volumes
 
WordPress Workshop
WordPress WorkshopWordPress Workshop
WordPress Workshop
 
Media Concept and classification of Media
Media Concept and classification of MediaMedia Concept and classification of Media
Media Concept and classification of Media
 
Employees grievances and disciplines
Employees grievances and disciplinesEmployees grievances and disciplines
Employees grievances and disciplines
 
WordPress
WordPressWordPress
WordPress
 
VoIP
VoIPVoIP
VoIP
 
Hetauda App Introduction
Hetauda App IntroductionHetauda App Introduction
Hetauda App Introduction
 
Mozilla nepal
Mozilla nepalMozilla nepal
Mozilla nepal
 
Machine learning
Machine learningMachine learning
Machine learning
 
Google page ranking
Google page rankingGoogle page ranking
Google page ranking
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Computer Crime and Safety Measure

  • 1. Computer Crime and Safety Measure 1 Purushottam Dahal BIM,HSM www.purushottamdahal.com.np
  • 2. Content 1. Computer Crime 2. Software Piracy 3. Anti Piracy 4. Computer Virus, Worm, Spyware 5. Ethical Issues in Computer 6. Cyber Law 7. Network Security 8. Data and message security 5/23/2016 2
  • 3. Computer Crime  Computer crime describes a very broad category of offenses.  Some of them are the same as non-computer offenses, such as larceny or fraud, except that a computer or the Internet is used in the commission of the crime.  Others, like many forms of hacking, are uniquely related to computers. 5/23/2016 3
  • 4. Computer crime laws in many states prohibit a person from performing certain acts without authorization, including:  Improperly accessing a computer, system, or network;  Modifying, damaging, using, disclosing, copying, or taking programs or data;  Introducing a virus or other contaminant into a computer system;  Using a computer in a scheme to defraud;  Interfering with someone else's computer access or use;  Using encryption in aid of a crime;  Falsifying e-mail source information; and  Stealing an information service from a provider. 5/23/2016 4
  • 5. Software Piracy  The unauthorized copying of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time.  By buying the software, you become a licensed user rather than an owner. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.  Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors.  Originally, software companies tried to stop software piracy by copy-protecting their software. This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn't really stop software piracy. 5/23/2016 5
  • 6. Anti Piracy  Designed to prevent the unauthorized use or reproduction of copyright material. 5/23/2016 6
  • 7. Computer virus  A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them.  Infecting computer programs can include as well, data files, or the boot sector of the hard drive. 5/23/2016 7
  • 8. Worm  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.  Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.  Unlike a computer virus, it does not need to attach itself to an existing program. 5/23/2016 8
  • 9. Spyware  Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.  "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies.  Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. 5/23/2016 9
  • 10. Cyber law  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.  It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. 5/23/2016 10
  • 11. Network security  Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Network security involves the authorization of access to data in a network, which is controlled by the network administrator. 5/23/2016 11