Computer Crimes
Computer Crimes
COMPUTER CRIMES
1
COMPUTER
Provides :
- Facilities
- Facilitate criminal activities
2
Computer creates new form of crimes
3
Definition:
4
Two categories of Cyber Crimes
6
2. Individual Level
• include :
• cyberstalking,
• distributing pornography and
• trafficking.
7
3. Government Level
8
Types of Cyber Crime
Types Description
DDoS Attacks to make an online service unavailable and take the
network down by overwhelming the site with traffic from
a variety of sources
Botnets networks from compromised computers that are
controlled externally by remote hackers
Identity Theft occurs when a criminal gains access to a user’s
personal information to steal funds, access confidential
information, or participate in tax or health insurance
fraud.
Cyberstalking involves online harassment where the user is subjected
to a plethora of online messages and emails.
PUPs Potentially Unwanted Programs are less threatening
than other cybercrimes, but are a type of malware
9
Types of Cyber Crime
Types Description
Social Engineering involves criminals making direct contact with you usually by
phone or email.
to gain your confidence and usually pose as a customer
service agent so you’ll give the necessary information needed
Phishing involves hackers sending malicious email attachments or
URLs to users to gain access to their accounts or computer
Prohibited/Illegal involves criminals sharing and distributing inappropriate
Content content that can be considered highly distressing and
offensive
Online Scams usually in the form of ads or spam emails that include
promises of rewards or offers of unrealistic amounts of
money
Exploit Kits need a vulnerability (bug in the code of a software) in order to
gain control of a user’s computer.
They are readymade tools criminals can buy online and use
against anyone with a computer.
10
New crimes challenges to:
• Prosecute criminals
• Prevent crimes to happen
• Trace criminal evidence and activities
11
Is Cyber Crimes Exist?
12
Computer Crime Vs Cyber Crime
13
1996 – Cyber Law, the Provisions are:
14
Cyber Crimes and Risks
15
Computer Crime and Security
16
Computer Crime and Security
17
Computer Crime and History
19
Impact of Cyber crime on Society
20
How to Fight Cyber Crime?
21
Cyber Issues on Social Media
1. TikTok
- more than a billion and a half downloads and revenue of $40 million per
month, TikTok is aiming to be soon one of the most popular apps in the
world.
- Business Insider calls TikTok “the next frontier in social media not just
for influencers, but for marketers and advertisers,”
Dangers on TikTok
- Prone to addiction
- Video challenges – injuring kids across the country
- Privacy concerns - ByteDance is a Chinese company, and the data collected by them that
includes biometric scans of faces may end up being used by the communist party ruling in
China. TechCrunch recently pointed out that ByteDance has secretly built a deepfakes maker
that could one day be used in TikTok. Military personnel can still access the app as long as it is
installed on a personal smartphone but are strongly advised to defer from it (Pandasecurity, 2020)
22
Cyber Issues on Social Media
23
Cyber Issues on Social Media
24
Cyber Issues on Social Media
25
Cyber Issues on Social Media
4. Cyberbullying
- 5 reasons kids don’t report cyberbullying:
- Fear of retaliation
- Don’t recognized bullying
- Feel ashamed
- Unsure of adult’s reaction
- Think no one will believe them or help
26
How to Clean Your Social Media
27
How to Clean Your Social Media
28
How to Clean Your Social Media
29
30
31
32