Top Banner
Cyber Crime
16

Cyber crime final

Jan 16, 2017

Download

Social Media

Zeeshan Ahmed
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime final

Cyber Crime

Page 2: Cyber crime final

“What is Crime”Harmful act against the public which the

State wishes to prevent, and is punishable by fine, imprisonment, and/or death.

Examples

Page 3: Cyber crime final

Computer Crime or Cyber Crime

Crime that involves a Computer and a Network.

Page 4: Cyber crime final

Purposes of Cyber CrimeStealing a person’s identityMaking MoneyHarassing SomeoneGetting Secret Records or PasswordsAssessing someone personal Data

Page 5: Cyber crime final

Categories of Cyber CrimeComputer as a Weapon; using a Computer to

commit real World Crime.Computer as a Target; using a Computer to

attack on other Computer

Page 6: Cyber crime final

Classification of Cyber Crime Against Person

i. Hackingii. Harassment

Against Propertyi. Intellectual property crimesii. Hacking Computer System

Against Governmenti. Cyber Terrorismii. Information

Page 7: Cyber crime final

Types of Cyber CrimesHackingComputer VandalismCyber TerrorismSoftware Privacy

Page 8: Cyber crime final

Hacking Crime wherein a person’s computer is broken into so

that his personal or sensitive information can be accessed

Also known as Cracking.Government websites are the hot targets of hackers.

Page 9: Cyber crime final

Computer Vandalism

Damaging or destroying the data rather than stealing or misusing

Transmitting Viruses; These are the programs that attach themselves to a file and then circulate from one computer to other.

Page 10: Cyber crime final

Cyber TerrorismThe politically motivated use of computers

and information technology to cause severe disruption or widespread fear.

Using Computer and Network to spread fear in among civilians.

Page 11: Cyber crime final

Software Privacy Illegal copying, distribution, or use

of softwareAccording to the Business Software Alliance

(BSA), about 36% of all software in current use is stolen.

Built to protect the privacy of its users

Page 12: Cyber crime final

Safety Tips

Page 13: Cyber crime final

Safety Tips To CybercrimeUse Antivirus Software’sUninstall Unnecessary SoftwareMaintain backup Check security settingsNever give your full name or address to

strangers.

Page 14: Cyber crime final

Security

Page 15: Cyber crime final

Advantages of Cyber Security

This Security will defend us from critical attacks

Helps us to browse the safe websiteSecure all the incoming and outgoing data on

our computer

Page 16: Cyber crime final

THANKS FOR WATCHING