COMPUTER CRIME AND TYPES OF CRIME Prepared by : NURUL FATIHAH BT ANAS. - PowerPoint PPT Presentation

slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
COMPUTER CRIME AND TYPES OF CRIME Prepared by : NURUL FATIHAH BT ANAS. PowerPoint Presentation
Download Presentation
COMPUTER CRIME AND TYPES OF CRIME Prepared by : NURUL FATIHAH BT ANAS.

play fullscreen
1 / 13
COMPUTER CRIME AND TYPES OF CRIME Prepared by : NURUL FATIHAH BT ANAS.
145 Views
Download Presentation
zoltan
Download Presentation

COMPUTER CRIME AND TYPES OF CRIME Prepared by : NURUL FATIHAH BT ANAS.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.

  2. DO YOU KNOW ANYTHING ABOUT COMPUTER CRIMES? 1

  3. YES OR NO 2

  4. INTRODUCTION Although the technology have been improve from year to year but there are still have some individual outside involve in cyber crime. These cases have become major problem because most of the cybercrime activities are very difficult to solve it. With access to the Internet, some people will try to do malicious damage on computer and data stored in the computer. 3

  5. COVERT MESSAGES • Many different types of cyber crimes • Cyber bullying- beware of what we comment in communication website, tell parents if fallen victim • Downloads- make sure it is legal • Computer virus- must know what action to take to protect our computers • Must know how to protect ourselves from cyber crimes 4

  6. PHISHING 5

  7. HACKING 6

  8. COMMUNICATION PIRACY 7

  9. ELECTRONIC FUND TRANSFER FRAUD 8

  10. ELECTRONIC VANDALISM, EXTORTION AND TERRORISM 9

  11. 10

  12. CONCLUSION Computer crime is everyone’s problem. Information is the best form of protection. Prevention method to solve the problems:  set your Firewalls frequently changing password or ID number have a safe surfing. frequently checking for virus. on your Email filters such as pop up blocker 11

  13. CREDIT • http://www.cartoonstock.com/newscartoons/cartoonists/gri/lowres/grin699l.jpg • http://www.techmaish.com/wp-content/uploads/2011/08/cyber-crime.jpg • http://1.bp.blogspot.com/_kdrphzeOB5k/S6FwJldrdSI/AAAAAAAABTQ/L29QMNLauoU/s400/261373070_e23d7f46fb.jpg • http://georgiatechcomputerscience.com/wp-content/uploads/2011/08/what-is-computer-crime.jpg • http://www.infoniac.com/uimg/computer-virus-skull-monitor.jpg • http://computerspictures.net/computer-hacker-alert.jpg • http://usrlib.info/wp-content/uploads/2011/11/The-Emerging-Threat-of-Cyber-Terrorism.jpg 12