Ybercrime is where the computer is used as an object or subject of crime. Yberstalking - involves following a person movements across the Internet by - posting messahes%'mail spoofing' (mail which misrepresents its origin) omputer / andalism - involves destroying data rather than stealing or - misusing them.
Ybercrime is where the computer is used as an object or subject of crime. Yberstalking - involves following a person movements across the Internet by - posting messahes%'mail spoofing' (mail which misrepresents its origin) omputer / andalism - involves destroying data rather than stealing or - misusing them.
Ybercrime is where the computer is used as an object or subject of crime. Yberstalking - involves following a person movements across the Internet by - posting messahes%'mail spoofing' (mail which misrepresents its origin) omputer / andalism - involves destroying data rather than stealing or - misusing them.
advancements and improvements that technology offers us. The Internnet places a vast amount of information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend or purchase your favorite stock. However, as the legitimate use of the Internet increases throughout our nation and the world, the wronful use of the Internet to commit crime and victimize people also increases. Today, I want to talk about ybercrime. I. Definition ! "ll the rimes commited on the computer networks, # in particular on the the Internet. ybercrime is nothing but where the computer is used as an ob$ect or sub$ect of crime. II. History Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. ( Ex : Most spam is commercial advertising )
III. Potential victims of cybercriminals and dangers of these attacks. a% "gainst &'()*+) ! Harassment via,emails - Harassment through e,mails isn.t a new concept. It.s very similar to harassing through letters % yber,stalking - involves following a person movements across the Internet by posting messahes% 'mail spoofing - " mail which misrepresents its origin. It shows it.s origin to be different from which actually it is originate % b% "gainst &(*&'(TI') ! omputer /andalism - 0amaging or destroying data rather than stealing or misusing them % Transmitting virus - These are programs that attach themselves to a file and then circulate. They usually affect the data on a computer, either by altering or deleting it % c% "gainst 1*/'(+2'+T yber Terrorism - ex ! *sama 3en 4aden 5 the attack on "merica.s army deployment system during the Ira6 war % I/. TYPES ! hild pornography ! The use of computer networks to create, distribute, or access materials that sexually use underage children. yber ontraband ! Transferring illegal items through the internet that is forbidden in some locations yber 4aundering ! 'lectronic transfer of illegally,obtained money with the goal of hiding its source and possibly its destination. yber )talking ! Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. - fb % yber Theft ! 7sing a computer to steal. This includes activities related to ! reaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy. /. The political issue - How does the politic deal with yber,rime % yber )ecurity ! &rotection of your personal information by responding, detecting and preventing the attacks. What are the different ways to arrest a yber,criminal 8What penalties apply to them 8 It.s really difficult to arrest or to identify a yber,riminal. In most cases, it.s not thanks to the investigators that they are put in $ail, but to human weakness ! 7sually, it.s someone who denounce the cyber,criminal, or the cyber,crimnal himself. I+T'(&*4 -9International &olice% is an international organisation with the purpose of promoting the international police cooperation. They share the informations which allow to find the yber,criminals. V. The punishment : principals ! "ccess into a data system ! ; years of detention and a fine 9 amande% of :< <<<= orrupt datas by modifying or deleting them ! : years 5 >? <<<= Hinder and falsify the data system ! ? years 5 ?? <<<= V. !yber Security /III. The increase of these attacks over the years (apid expansion of the e,market. @/ideoA 4 ! )&"2 /I(7). 0anger entreprise ! &erte d.argent. Taux ? premiBres 4es cybercriminels ont correctement CvaluC leurs chances d.Dtre arrDtCs ! elles sont trBs faibles E, a a$outC 2. layton Hackers/Cracker/ Black hat (or Criminal Hacker) : Corpse /Black hat hy did you choice this topic ! "ecause : Ev#d is use $%M&'(E)*. +ew generation is growing up with computers. 'seful to give some advices to protect from $y#er $riminality &rofil of the yber riminal ! Distruntled employees Teenagers Political Hacktivist Proessional Hackers Business !ivan "#$Boy %riend / "#$&irl %riend The 'ictims : &ulli(le) &reedy people) unskilled * +ne#perienced) unluck people