You are on page 1of 3

The level of our technology keeps on improving.

Over the years, there have been many


advancements and improvements that technology offers us.
The Internnet places a vast amount of information and exciting experiences at your command.
With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send
flowers to a friend or purchase your favorite stock.
However, as the legitimate use of the Internet increases throughout our nation and the world, the
wronful use of the Internet to commit crime and victimize people also increases.
Today, I want to talk about ybercrime.
I. Definition !
"ll the rimes commited on the computer networks, # in particular on the the Internet.
ybercrime is nothing but where the computer is used as an ob$ect or sub$ect of crime.
II. History
Spam is flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to
receive it. ( Ex : Most spam is commercial advertising )


III. Potential victims of cybercriminals and dangers of these attacks.
a% "gainst &'()*+) !
Harassment via,emails - Harassment through e,mails isn.t a new concept. It.s
very similar to harassing through letters %
yber,stalking - involves following a person movements across the Internet by
posting messahes%
'mail spoofing - " mail which misrepresents its origin. It shows it.s origin to be
different from which actually it is originate %
b% "gainst &(*&'(TI') !
omputer /andalism - 0amaging or destroying data rather than stealing or
misusing them %
Transmitting virus - These are programs that attach themselves to a file and then
circulate. They usually affect the data on a computer, either by altering or deleting
it %
c% "gainst 1*/'(+2'+T
yber Terrorism - ex ! *sama 3en 4aden 5 the attack on "merica.s army
deployment system during the Ira6 war %
I/. TYPES !
hild pornography ! The use of computer networks to create, distribute, or access
materials that sexually use underage children.
yber ontraband ! Transferring illegal items through the internet that is
forbidden in some locations
yber 4aundering ! 'lectronic transfer of illegally,obtained money with the goal
of hiding its source and possibly its destination.
yber )talking ! Threats that creates fear through the use of computer technology
such as email, phones, text messages, webcams, websites or videos. - fb %
yber Theft ! 7sing a computer to steal. This includes activities related to !
reaking and entering, unlawful appropriation, identity theft, fraud, malicious
hacking and piracy.
/. The political issue - How does the politic deal with yber,rime %
yber )ecurity ! &rotection of your personal information by responding,
detecting and preventing the attacks.
What are the different ways to arrest a yber,criminal 8What penalties apply to
them 8
It.s really difficult to arrest or to identify a yber,riminal. In most cases, it.s not
thanks to the investigators that they are put in $ail, but to human weakness !
7sually, it.s someone who denounce the cyber,criminal, or the cyber,crimnal
himself.
I+T'(&*4 -9International &olice% is an international organisation with the
purpose of promoting the international police cooperation. They share the
informations which allow to find the yber,criminals.
V. The punishment
: principals !
"ccess into a data system ! ; years of detention and a fine 9 amande% of :< <<<=
orrupt datas by modifying or deleting them ! : years 5 >? <<<=
Hinder and falsify the data system ! ? years 5 ?? <<<=
V. !yber Security
/III. The increase of these attacks over the years
(apid expansion of the e,market.
@/ideoA
4 !
)&"2 /I(7). 0anger entreprise ! &erte d.argent. Taux
? premiBres
4es cybercriminels ont correctement CvaluC leurs chances d.Dtre arrDtCs ! elles sont trBs
faibles E, a a$outC 2. layton
Hackers/Cracker/
Black hat (or Criminal Hacker) : Corpse /Black hat
hy did you choice this topic !
"ecause :
Ev#d is use $%M&'(E)*.
+ew generation is growing up with computers.
'seful to give some advices to protect from $y#er $riminality
&rofil of the yber riminal !
Distruntled employees Teenagers Political Hacktivist Proessional Hackers Business
!ivan "#$Boy %riend / "#$&irl %riend
The 'ictims : &ulli(le) &reedy people) unskilled * +ne#perienced) unluck people

You might also like