0% found this document useful (0 votes)
20 views13 pages

Cybersecurity - Adam

The document discusses various types of cyber crimes including hacking, ransomware, viruses, denial of service attacks, spam, computer vandalism, obscene content, fraud, software piracy, harassment, cyber stalking, and child pornography. It also covers cyber terrorism, cyber bullying, and hacking activism.

Uploaded by

chipetakay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views13 pages

Cybersecurity - Adam

The document discusses various types of cyber crimes including hacking, ransomware, viruses, denial of service attacks, spam, computer vandalism, obscene content, fraud, software piracy, harassment, cyber stalking, and child pornography. It also covers cyber terrorism, cyber bullying, and hacking activism.

Uploaded by

chipetakay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

9/17/2022

FOCUS ON

PRESENTED BY PHIRI A
MALCOLM MOFFATT COLLEGE OF EDUCATION
© 2021

CYBER CRIMES

•What is Cyber Space:


A non-physical (virtual) environment created by a
computer or computers in which communication, transfer
,storage and /or modification of electronic data occurs

1
9/17/2022

DEFINITIONS
Cyber Attack: is a deliberate exploitation of
computer systems and networks of
information society
Hacking: refers to unlawful access to a
computer system
Hacker: a hacker is someone who exploits
weaknesses in a computer system or computer
network

DEFINITIONS

COMPUTER FRAUD:
Illegal means by which people (fraudsters) intend to
deceive, misrepresent, destroy, steal information, or
cause harm to others by accessing information
through deceptive ways. E.g piracy, social engineering.

2
9/17/2022

What exactly is CYBER CRIME

Cyber Crime: refers to any unlawful activity that


involves a computer/mobile system and a network
system with intention to compromise the
Confidentiality ,Integrity or Availability (CIA) of Data
or Authenticity of a computer resource .

Why is CYBER CRIME on the Rise?


• Economic reasons – escalating prices of commodities and
tools
• More cyber criminals than cyber cops

• Criminals feel safe committing crimes from the privacy of


their homes

• Cyber threats may be perpetrated with little cost and few


resources.

3
9/17/2022

Why is CYBER CRIME on the Rise?

Brand new challenges for law enforcement

• Most are not trained in technologies

• Internet crimes span multiple jurisdiction

Why is CYBER CRIME on the Rise?

• ICTs have become an integral part of information society

• Critical systems have been adapted into cyber space making


them key targets.

• Cyber attacks on ICTs are borderless and can be launched


from virtually anywhere

4
9/17/2022

CATEGORIES OF CYBER
CRIME
Cyber Crime may be basically
divided into three (3) categories-
• Against Persons

• Against Property

• Against Government

CATEGORIES OF CYBER
CRIME
Against Person
• distribution, posting, and dissemination of obscene material,
indecent exposure and Child pornography

• harassment of any one with the use of a computer (Cyber-


bullying) such as e-mail, and cyber-stalking

5
9/17/2022

CATEGORIES OF CYBER
CRIME
Against Property
• unauthorized computer trespassing through cyberspace
• computer vandalism,
• transmission of harmful programs,
• unauthorized possession of computerized information.

CATEGORIES OF CYBER
CRIME
Against Government
• Hactivism

• Cyber Terrorism

6
9/17/2022

HACTIVISM
Hacktivism is the act of misusing a computer system
or network for a socially or politically motivated
reason. Hacktivism is a two dimension technic which
involve hacking activities that maybe just from curious
purposes and less harmless as compared to terrorism
intentions which are meant for destruction.

HACTIVISM

The other side is the activism whose main goal is to bring


issues to light and cause social change. It can also be
considered activism because it achieves these goals in a
relatively peaceful manner.
Examples; online petitions, demonstrations over certain opinions
using emails and social media platforms. Protesting acts of war,
supporting democracy, promoting media freedom etc.

7
9/17/2022

CYBER TERRORISM

cyberterrorism is the politically motivated use of computers and


information technology to cause severe disruption or widespread fear in
society.
 The use of computer systems and internet technology to push a
political ideology or social agenda of a particular group of people
while injuring the innocent citizenry.

CYBER TERRORISM
 Common examples of cyberterrorism are hacking into computer
systems, introducing viruses to vulnerable networks, web site
defacing, Denial-of-service attacks, or terroristic threats made via
electronic communication. Sabotage of systems in various fields
(water, manufacturing, intelligence and banking systems).
 Terrorist would overload network systems, abuse public lines by using
virtue weapons such as logic bombs, Trojan horses, viruses etc.

8
9/17/2022

CYBER STALKING
• Cyberstalking is a crime in which the attacker harasses a
victim using electronic communication, such as e-mail or
instant messaging (IM), or messages posted .. E.g. on WhatsApp,
twitter, Facebook etc.
• Stalkers would;
• Discredit your place
• Use your Image - defamation / defacement
• Personal details

CYBER BULLYING
• the use of digital technologies. It can take place on social media, messaging
platforms, gaming platforms and mobile phones. It is repeated behavior,
aimed at scaring, angering or shaming those who are targeted.
• E.g.
• Posting lies about a person
• Embarrassing photos
• Posting Threatening information

9
9/17/2022

CHILD PORNOGRAPHY

Child pornography is a form of pornography showing or


exposing children to obscene materials and videos which is against
the law in many countries. Child pornography is most often made by
taking pictures or videos, or more rarely sound recordings of children
who are wearing less clothing than usual, wearing no clothing,
or having sex. Child pornography is sometimes called "child sexual
abuse images" because it is images (pictures) of a child who is
being sexually abused.

CHILD PORNOGRAPHY

Child pornography is highly carried out by elderly people who wish


to fulfilled their lusts of sexual desires, it is done through the use of
internet and ICT systems such as setting up camera and recording
devices to capture the activities of an elderly person and a child
playing with their genital parts. These materials are then sent on the
internet and other social media platforms.
Note: The people targeting the young ones for internet
sexual related activities are known as Sexual predators

10
9/17/2022

CONT…
• Files can be protected in a variety of ways
including:
• The use of passwords for user access to the
computer network and on individual user areas
and/or files.
• Restricting user access to only those areas of the
computer network they need to access.

CONT…
• Encrypting means encoding (scrambling)
data to stop unauthorised people being able
to read the data.
• Only users who have the key to the code
can decode (decrypt) the data.

11
9/17/2022

CONT…
• Encryption is particularly useful when data is being sent
over a WAN system (e.g. the Internet)
• Encryption is used by online businesses to protect a
customer’s confidential financial data (e.g. credit card
details) from being accessed by someone who could use
that data fraudulently.
• World’s best encryption tool: is the Pretty Good Privacy(
PGP). Provides cryptographic privacy and authentication
for data communication. Encrypts texts, emails, files, disk
partitions etc.

IN SUMMARY TYPES OF CYBER


CRIME Hacking
Ransomware/Malwa
Virus andreWorms
Denial of Service
Attacks
Spam
Computer

CYBER CRIME
Vandalism
Obscene Content
Fraud
Software Piracy
Harassment
Cyber Stalking

Child Pornography

12
9/17/2022

THE END

THANK YOU FOR LISTENING

GOD BLESS YOU ALL!!!

“ours is a journey”

13

You might also like