1 / 21

E-rule : Cyber crimes

E-rule : Cyber crimes. Tutorial. cyber news. “ It is a growing threat to the national economy ”. Incidence of cyber crime in the country jumped 88 per cent last year with 15,218 cases compared with 8,090 in 2010.

flann
Download Presentation

E-rule : Cyber crimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-rule : Cyber crimes Tutorial

  2. cyber news “It is a growing threat to the national economy” Incidence of cyber crime in the country jumped 88 per cent last year with 15,218 cases compared with8,090 in 2010. CyberSecurityMalaysia's chief executive officer Lt Col (R) HusinJazri, in disclosing this, said the majority of cases reported last year involved online fraud, intrusion and harassment. New Straits Times (1 March 2012)

  3. Criminals file

  4. Criminals Files

  5. MEET THE ATTACKERS Hacker Cyber Extortionist Corporate Spies Cyber Bully Cyber Terrorism

  6. Cyber crimes

  7. Cyber Crimes

  8. 1. hacking & cracking • Breaking into computer system to gain an unauthorized access. • Defeating the security capabilities of computer system to obtain an illegal access to the information stored

  9. 1. hacking & cracking • To acquire financial information of a bank and change the bank accounts. • To steal data on business or consumer. • To distribute viruses.

  10. 1. hacking & cracking • Someone who accesses a computer or network illegally. • Both have advanced computer and network skills. Hacker Cracker

  11. 1. hacking & cracking • Has the same intent as crackers and hackers . • BUT does not have technical skills and knowledge. • Use prewritten hacking and cracking program to break into computers. Script Kiddies

  12. 2. Cyber bullying • Occurs when a person is bullied, harassed, humiliated, threatened, embarrassed, or targeted in some way by another person. • It is done through the use of the internet, cell phones and other forms of digital technology

  13. 2. Cyber bullying • “Borrowing” someone’s screen name and pretending to be them • Nasty instant messaging session. • A website set up to mock others. • A threatening e-mail.

  14. 2. Cyber bullying • Normally committed by one child or teenager towards another child or teenager. • Sometimes, adults are involved too. • This is done because of motivated by anger, revenge or frustration. Some just do it for entertainment. Cyber Bully

  15. 3. Cyber Terrorism • Is the convergence of terrorism and cyberspace • An unlawful attacks and threats of attack against computers, networks, and the information • It is done because of political or social objectives

  16. 3. Cyber Terrorism • Uses Internet or network for political reasons • Target : nation’s air traffic control or telecommunication infrastructure • Require a team of highly skilled individuals, millions of dollars and several years of planning Cyber Terrorist

  17. 4. Cyber Espionage • The act or practice of obtaining secrets • It is done without the permission of the holder of the information • They seek personal, sensitive, proprietary information

  18. 4. Cyber Espionage • Have excellent computer and networking skills • Hired to break into computer to steal data and information or to identify security risk on organization • Immoral company hired them to gain competitive advantage Corporate Spies

  19. 5. Cyber Extortion • It is a crime involving an attack or threat of attack against an enterprise • It is done coupled with a demand for money to avert or stop the attack

  20. 5. Cyber Extortion • Uses e-mail for extortion • Send threatening e-mail message indicating they will expose confidential information, exploit security flaw or launch attack to the company’s network – if they are not paid a sum of MONEY Cyber Extortionist

More Related