Cyber-Crime- by Kristel.pptx

Embed Size (px)

Citation preview

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    1/15

    Cyber Crime

    Kristel Joy D.Macose

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    2/15

    Defnition

    It is an unlawful act done usingcomputers and network wherein

    the computer is either

    1. a tool,

    2. a target, or3. both.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    3/15

    Categories

    According to the Role o Computer1. Computer as a targetUsing computers as the object of the crime

    2. Computer as a weapon (toolUsing computer to commit crimes

    3. Computer as an accessor! (both target"tool#tolen $ata % from targeted computersIllegal $ata % of crimes committed against

    someone

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    4/15

    Categories

    According to Types o CyberCrime Victims

    1. &gainst 'ersonC!ber crimes committed against persons

    2. &gainst 'ropert!C!ber crimes that are against all forms of propert!.

    3. &gainst )o*ernmentC!ber crimes committed to national"internationalgo*ernments to threaten the citi+ens of a countr!.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    5/15

    Types

    1. acking Illegal intrusion into a computer s!stem and"or

    network.

    ac!er originall! referred to a person with a*er! high le*el of computer e-pertise but nowthe term usuall! describes a person who gains

    access to computer s!stems illegall!.

    -perts prefer the term crac!erfor personsengaging in illegal acti*ities.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    6/15

    Types

    Types o ac!ers#0hite at ackers )ood gu!s

    lue hat % utside computersecurit! consulting rmslack at ackers ad gu!s.

    nl! interested in personal goals)ra! at % #omewhere in

    between.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    7/15

    Types

    2. C!ber 'ornograph!4his would include'ornographic websites5'ornographic maga+ines produced

    using computers Internet used to download and

    transmit pornographic pictures,photos, writings etc.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    8/15

    Types

    3. 6inancial C!ber Crimes4his would include cheating, credit

    card frauds, mone! laundering etc.

    -amples'hishing 7eceipt of unsolicited

    emails from fake nancialinstitutions

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    9/15

    Types

    8. C!ber stalkingnline harassment and online abuse.btaining information of the *ictim

    order to threaten or frighten the*ictim.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    10/15

    Types

    9. $enial:of:ser*ice ( $o# attack ordistributed denial:of:ser*ice attack (

    $$o# attack

    It is an attempt to make a machineor network resource una*ailable toits intended users.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    11/15

    Types

    ;. $ata Interference

    Unauthori+ed alteration, damaging,deletion or deterioration of computerdata, document.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    12/15

    Types

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    13/15

    Classifcation o CyberCriminals

    1stClassication

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    14/15

    Computer $orensic

    It is an autops! of a computer ornetwork to unco*er digital e*idence

    of a crime. 4he e*idence must bepreser*ed and hold up in a court oflaw.

  • 7/24/2019 Cyber-Crime- by Kristel.pptx

    15/15

    Computer $orensic

    C%&'R ()AC'CR*M*+A,(

    $eleting their les andemails

    iding their les b!encr!ption, passwordprotection, orembedding them in

    unrelated les (dll, osetc

    Using 0i:6i networksand c!ber cafes toco*er their tracks

    $-R'+(*C(

    7estoring deleted lesand emails % the! are stillreall! there.

    6inding the hidden les

    through comple-password, encr!ptionprograms, and searchingtechni=ues.

    4racking them downthrough the digital trail :I' addresses to I#'s tothe o>ender.