0% found this document useful (0 votes)
20 views16 pages

Computer Crime and Forensic Investigation - PDF - 2

Uploaded by

juanitabaidoo661
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views16 pages

Computer Crime and Forensic Investigation - PDF - 2

Uploaded by

juanitabaidoo661
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

COMPUTER CRIME & FORENSIC INVESTIGATION

GROUP 5

MR.GHARTEY EWOOL
GROUP 5 MEMBERS
•Owusu Amankwah Maudren 13034452

•Appiah-Boateng Ronald 13026840

•Baidoo Juanita Afriyie 13032851


TYPES OF COMPUTER CRIME
Computer crime, also known as cybercrime, involves illegal activities
carried out using computers or the internet. These include;
• Identity Theft
• Hacking
•Cyber Stalking
• Financial Fraud

These and many more types of cybercrime can have severe


consequences for individuals, businesses, and governments,
making cybersecurity and legal enforcement critical.

GROUP 5
TYPES OF COMPUTER CRIME CONT.
In this presentation, we will discuss two forms of computer
crimes. These include ;
•Identity theft
• Hacking.

GROUP 5
IDENTITY THEFT
•Identity theft occurs when an individual’s personal information is
stolen and used to commit fraud or obtain benefits without their
consent.
• This personal information can include a wide range of sensitive
data such as Social Security numbers, bank account details,
credit card information, driver’s license numbers, and even login
credentials for various accounts.
• The key feature of identity theft is that the thief pretends to be
someone else, leveraging the victim’s identity to access resources
or benefits unlawfully.

GROUP 5
TYPES OF INDENTITY TEFT
•1. Financial Identity Theft: Stealing personal information to access financial
resources or obtain loans and credit cards.

•2. Credit Card Identity Theft: Using stolen credit card information to make
unauthorized purchases.

•3. Social Security Number (SSN) Identity Theft: Misusing someone's SSN
to gain employment, access government benefits, or commit tax fraud.

•4. Driver's License Identity Theft: Using a stolen driver's license to commit
crimes or evade law enforcement.
GROUP 5
HOW IDENTITY THEFT HAPPENS
•1. Data Breaches: Hacking into companies, governments, or
organizations, compromising personal information.

•2. Phishing Scams: Fraudulent emails, texts, or calls tricking individuals


into revealing sensitive information.

•3. Physical Theft: Stealing wallets, purses, mail, or documents cont


personal information.

•4. Social Engineering: Manipulating individuals into divulging personal


information.
GROUP 5
Warning Signs of Identity Theft
•1. Unexplained credit card charges or withdrawals
•2. Mysterious accounts or loans
•3. Error messages when logging into accounts
•4. Receiving unfamiliar credit cards or statements
•5. Being denied credit or loans due to unknown reasons

GROUP 5
HOW TO PREVENT IDENTITY THEFT

•1. Monitor accounts regularly


•2. Use strong passwords and 2FA
•3. Keep personal info private
•4. Shred sensitive documents
•5. Use identity theft protection services
•6. Be cautious with public Wi-Fi

GROUP 5
HACKING
•Hacking refers to the act of exploiting vulnerabilities in a computer
system or network to gain unauthorized access to data or disrupt
normal operations. A hacker is someone who carries out these
activities.

•Hacking can be classified into two major categories:


•Ethical hacking (White-hat hacking): Legal and ethical hacking
performed to identify and fix vulnerabilities in systems.
•Malicious hacking (Black-hat hacking): Illegal hacking done with the
intent to steal, damage, or exploit data for personal gain.

GROUP 5
TYPES OF HACKING
1. Black Hat Hackers
•Threat level: High
•Description: Malicious hackers who use their skills for personal gain,
financial profit, or to cause harm. They often engage in unauthorized
access, data theft, and destruction of digital systems.
2. White Hat Hackers
•Threat level: Low
•Description: Ethical hackers who use their skills to help organizations
improve their cybersecurity by identifying vulnerabilities and
weaknesses. They operate with permission and work to prevent
attacks.

GROUP 5
3. Gray Hat Hackers
•Threat level: Medium
•Description: Hackers who operate in a gray area, often exploiting vulnerabilities
without permission but without malicious intent. They may demand payment for
disclosing discovered weaknesses.
4. Blue Hat Hackers
•Threat level: Low
•Description: Experts employed by companies to test and improve their
cybersecurity. They use their skills to identify vulnerabilities and weaknesses,
helping organizations strengthen their defenses.
5. Purple Hat Hackers
•Threat level: Low
Description: Self-trained hackers who hack their own systems to learn and improve
their skills in a controlled environment.

GROUP 5
Common Hacking Methods
1. Phishing
• Description: A social engineering attack where hackers trick users into revealing sensitive
information, such as passwords or credit card numbers, often through fraudulent emails or
websites
2. Password Cracking
• Description: Techniques used to break or guess passwords to gain unauthorized access to
systems or accounts. Common methods include brute force attacks and dictionary attacks.
3.SQL Injection
• Description: A code injection technique where malicious SQL statements are inserted into a web
form to manipulate databases and gain access to sensitive information.
4. Malware
• Description: Malicious software designed to damage, disrupt, or steal information from computer
systems. Malware includes viruses, ransomware, spyware, and trojans.

GROUP 5
Warning Signs of Hacking
•1. Unusual login locations or times •2. Suspicious emails
or attachments •3. Unexpected software updates or
installations •4. Strange network activity or slow
performance •5. Unexplained changes to system settings
or files •6. Pop-ups, ransomware demands, or other
malicious
activity
•7. Unrecognized devices or users on the network

GROUP 5
How To Prevent Hacking
1. Use Strong Passwords
• Use complex passwords that are hard to guess, and avoid using the same password for
multiple accounts.
2. Enable Two-Factor Authentication (2FA)
• Add an extra layer of security by requiring two forms of verification (e.g., password + code
from your phone).
3. Keep Software Updated
• Regularly update your operating systems, applications, and security software to patch
vulnerabilities
4. Install Antivirus and Anti-Malware
• Ensure your devices are equipped with reliable security software to detect and block
malware.
5. Regular Backups
• Back up your important data regularly to ensure you can recover it in case of a ransomware
attack..

GROUP 5
In Conclusion,
•In conclusion, identity theft and hacking are serious

cybercrimes that can have devastating consequences for


individuals and organizations. It's crucial to be aware of
the warning signs and take preventive measures to
protect yourself and your data.

THANK YOU!!

GROUP 5

You might also like