0% found this document useful (0 votes)
144 views20 pages

Lecture 7b Cybercrime

Cyber crimes involve computers or networks as tools, targets, or places of criminal activity. Common cyber crimes include computer viruses, phishing, hacking, spoofing, and cyber stalking. Cyber criminals are motivated by desires such as entertainment, profit, revenge, or political/sexual motivations. Laws have been implemented worldwide to address cyber crimes, including electronic commerce acts. Preventing cyber crimes involves using strong passwords, antivirus software, backing up data, and avoiding unknown email attachments. Recommendations include fostering international cooperation, building public awareness through education, and training law enforcement.

Uploaded by

crossg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views20 pages

Lecture 7b Cybercrime

Cyber crimes involve computers or networks as tools, targets, or places of criminal activity. Common cyber crimes include computer viruses, phishing, hacking, spoofing, and cyber stalking. Cyber criminals are motivated by desires such as entertainment, profit, revenge, or political/sexual motivations. Laws have been implemented worldwide to address cyber crimes, including electronic commerce acts. Preventing cyber crimes involves using strong passwords, antivirus software, backing up data, and avoiding unknown email attachments. Recommendations include fostering international cooperation, building public awareness through education, and training law enforcement.

Uploaded by

crossg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 20

CYBER CRIMES

INTRODUCTION
 Activity in which computers or networks are a tool, target, or a place of
criminal activity.
 cyber crime is a subset of computer crime. In a cyber crime, the computer
network can be;
 The tool of a crime
 The target of a crime
 Used for purpose incidental to a crime
DEFINITIONS

 Offences that are committed against individuals or group of


individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm to the
victim directly or indirectly, using modern telecommunication
networks such a s internet.
 Cyber crime is a term for any illegal activity that uses a computer
as its primary means of communication. The U.S. department of
Justice expands the definition of cyber crime and includes any
illegal activity that uses a computer for the storage of evidence.
 Cyber crime also stated as any use of a computer as an
instrument of further illegal ends, such as;
 Committing fraud
 Stealing identities
 Violating privacy
HISTORY

 The first recorded cyber crime took place in the year


1820, when , Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom.
 The firm spam e-mail took place in 1978 when it was
sent out over the Arpanet.
 The first Virus was installedon an Apple computer
in1982.
 A Sixteen years old student nicknamed “Data Stream”,
arrested by UK police (1994).
 Denial of Service (DoS) attacks by ‘Mafia Boy’ on eBay, Yahoo! And other
popular sites (2000).
 FBI’s e-mail system was hacked (Feb, 2005).
 Travelling documents of NATO forces were hacked in Afghanistan.
TARGETS OF CYBER CRIMES
 Against individual property
 Transmitting virus
 Un-authorized control/access over computer
 Intellectual property crimes
 Internet time thefts
 Against Organization
 Possession of un-authorized information
 Cyber terrorism against the government organization
 Distribution of pirated software,etc
 Against Social at Large
 Pornography (basically child pornography)
 Trafficking
 Financial crimes
 Online gambling
 Forgery
 Sale of illegal articles
SOME COMMON CYBER CRIMES
 Computer Virus: A computer virus is a computer program or attaches
itself to application programs or other executable system software causing
damage to the files.
 Phishing: Phishing occurs when the perpetrator sends fictitious e-mails to
individuals with links to fraudulent websites that appear official and
thereby cause the victim to release personal information to the
perpetrator.
 Hacking: The act of penetrating or gaining unauthorized access to or use
of data unavailable in a computer system or a computer network for the
purpose of gaining knowledge, stealing or making unauthorized use of the
data.
 Spoofing : Spoofing is the creation of TCP/IP packets using somebody
else’s IP address.
 Netsplonage: Netsplonage occurs when perpetrators back into online
systems or individual PCs to obtain confidential information for the
purpose of selling it to other parties.
 Cyber stalking: Cyber stalking refers to the use of the internet, email or
other electronic communications device to stalk another person. It is an
electronic harassment that involves harassing or threatening over a period
of time.
 Cyber Terrorism: Cyber terrorism occurs when terrorists cause virtual
destruction in online computer system.
MOTIVES OF CYBER CRIMINALS

 Desire for entertainment


 Profit
 Infuriation or revenge
 Political agenda
 Sexual motivations
 Psychiatric illness
CYBER LAWS

 Cyber law is a term used to describe the legal issues


related to use of communication technology,
particularly cyber space, i.e. internet.
 Cyber law is an attempt to apply laws designed for the
physical world to human activities on internet.
Cyber laws in the world
 Electronic Commerce Act (Ireland)
 Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)
 Electronic Transactions Ordinance (Hong Kong)
 Information Technology Act (India)
 Information communication Technology Act (Bangladesh)
 Cyber crime act Tanzania 2015
 Proposed CYBERCRIME AND CYBER SECURITY BILL, Zimbabwe 2017
Electronic transaction ordinance, 2002

Important sections are:


36 .Violation of privacy information.
37. Damage to information system, etc
Electronic/ cyber crime bill,

2007
It deals with the electronic crimes included:
 Cyber terrorism
 Data damage
 Electronic fraud
 Electronic forgery
 Cyber stalking
 Cyber spaming
 Un-authorizes access to code
PREVENTION

 Use hard to guess passwords


 Use anti-virus software and firewalls-keep them up to date
 Don’t open email or attachments from unknown sources
 Back up your computer on disk or CD often
RECOMMENDATIONS
 Fostering Linkages:
 Creation liaison with international community will create sharing of
experiences and good practices.
 The value of fostering co-operation internationally with other
countries/regions and parties needs to be enhanced.
 Co-operation between governments and the private sector in combating
cyber crime.
 Building National level Partnerships and Creating Awareness:
 Create specialized forums for exchange of experiences and information
which would entail initiating and promoting literary, technical and
scientific activity.
 Setting up a cyber crime cell consisting of experts to deal with cyber-crime
will encourage reporting and evolve into a process online with the
legislature.
 Training and Awareness Raising :
 It is essential to educate and empower youth to safely and responsibly
take control of their Internet experience.
 Disseminate general awareness of cyber crimes and user laws/rights by
arranging symposia, seminars, lectures, classes, demonstrations, and
presentations, briefings, to educate the society and gain their comfort
level.
 People need to be aware of the appropriate law enforcement investigative
authorities at the local, state, federal, or international levels.
CONCLUSION
It is not possible to eliminate cyber crime from the cyber space in its
entirety. However, it is quite possible to check it. Any legislation in its
entirety might be less successful in totally eliminating crime from the
globe. The primary step is to make people aware of their rights and duties
and further making the application of the laws more stringent to check
crime.
However, in any draft legislation it is important that the provisions of the
cyber law are not made so stringent that it may retard the growth of the
industry and prove to be counter-productive.

You might also like