You are on page 1of 1

CYBERCRIME

INTRODUCTION
• Cyber Crime: “any illegal act in which knowledge of computer
technology is used to commit the offense” (Quarantiello, 1996)
• Examples: fraud
identify theft
• Other terms: cybercrimes, computer crimes & technological
crimes

BACKGROUND
• First instance of cybercrime - hackers break into computer
networks
• Reasons: RECOMMENDATIONS
the thrill of accessing high-level security networks
OR  open any attachment of unidentified
to gain sensitive, classified material. emails.
• Criminals infect computer systems with computer viruses  log in online services (such as e-
• Result: banking) via hyperlinks attached in
breakdowns in personal and business computers emails.
 reveal your login password for you
• The “digital divide” provides “safe havens” for cyber‐criminals accounts.
(Broadhurst, 2006)
 follow security instructions given by
your organization
DISCUSSION
The Four Types of Cyber Crime:
1. Unauthorized use of computer-related assets
2. Introduction of fraudulent records or data into a computer system
3. Alteration or destruction of information or files
4. Theft of money, financial instruments, property, services, or data CONCLUSION
(Quarantiello, 1997) • cybercrimes getting
Protective Measures for Business stronger and more
• Log-on procedures organized
• Securing data from theft • domestic law is not
• Guarding against data manipulation effective – each country
• Protection against viruses. has different laws
Protective Measures for Individuals • need stricter laws
• Careful information dissemination, maintaining privacy and E-mail • must raise people’s
security. awareness about this
• Self-protective measures (e.g., in the work place)
• Authorities need to investigate the reasons for cybercrime

LSC 2103 28 March 2020 Presenters: Name 1, Name 2 and Name 3. CRN XXXXX

You might also like