0% found this document useful (0 votes)
204 views21 pages

Cyber Crime

Cybercrimes are criminal acts committed using computers or the internet. There are three main types: those using computers as weapons, as accessories to crimes, or targeting computers. Common cybercrimes include identity theft, hacking, sending spam emails, cyberbullying, online threats, fraud, illegal gambling, distributing viruses, copyright infringement, and persuading people to travel for prostitution. Cybercriminals can easily target unsuspecting victims and commit serious crimes from behind the anonymity of computer screens.

Uploaded by

Ryan Mostar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views21 pages

Cyber Crime

Cybercrimes are criminal acts committed using computers or the internet. There are three main types: those using computers as weapons, as accessories to crimes, or targeting computers. Common cybercrimes include identity theft, hacking, sending spam emails, cyberbullying, online threats, fraud, illegal gambling, distributing viruses, copyright infringement, and persuading people to travel for prostitution. Cybercriminals can easily target unsuspecting victims and commit serious crimes from behind the anonymity of computer screens.

Uploaded by

Ryan Mostar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

ALONE. AFRAID.

ONLINE
• Cybercrimes are criminal acts that use the computer or Internet. These
types of crimes are prevalent in modern technological society and are
becoming more high profile as a greater number of serious crimes are
committed.
• Three types of cybercrimes:
 those that use the computer as a weapon;
 those that use the computer as an accessory to a crime
 those that make the computer a target of a crime
• Identity theft involves stealing an individual’s personal
information, then using that information to either use their
financial resources without their consent, or to open new
financial or credit accounts, enabling the identity thief to
use the victim’s credit without their knowledge.
Information commonly stolen to make these crimes
possible include the individual’s name, date of birth, social
security number, and/or credit card numbers.
• Unlawfully accessing a computer without authorization and
sending multiple e-mails; resending multiple commercial
email messages with the intent to deceive recipients; or
falsifying header information in multiple email messages.
• Using the Internet to threaten to cause
damage with the intent to extort from any
person any money or other thing of value.
• In the digital age, many criminals easily commit fraud against
unsuspecting victims by misrepresenting the facts. For example, an
employee intentionally inputs false information into the company
database or intranet. Or consider the "Nigerian prince email,"
where an online predator attempts to steal money from targeted
consumers by gaining access to a shared bank account.
• Engaging in the business of betting or wagering on
any sporting event or contest over the Internet.
COMPUTER
VIRUS
• Computer hackers are digital age criminals that can bring down
large infrastructures with a single keystroke emitting a computer
virus. The most common way for the makers of computer viruses to
propagate their virus programs is to attach or embed them in
emails. When the email is opened, the virus activates and does
whatever it was programmed to do, such as steal valuable hard
drive disk space, destroy data on the recipient’s computer, access
personal information, or to send information (or itself) out to other
computers using the original victim’s contact list.
COMPUTER
VIRUS
PROSTITUTION
• Persuading, inducing, enticing, or coercing any
individual to travel in interstate commerce to
engage in prostitution.
PROSTITUTION
• Infringing a copyright for financial gain... or by
distributing a work being prepared for commercial
distribution on a computer network.
• Cyberbullying occurs when someone uses the internet, a cell
phone, email, instant messaging, chat rooms, or social networks,
such as Facebook and Twitter, to harass, demean, embarrass, or
intimidate someone else. It is commonly a crime committed by kids
and teens, as their growing access to electronic communication
makes it possible to make fun of or ostracize others. The problem
spreads like wildfire as the bully can hide behind the anonymity of a
login identity, while encouraging other kids to join in the “fun” of
harassing the victim.

You might also like