Professional Documents
Culture Documents
Cyber extortion
Cyber warfare
Fraud and Financial
Crimes
Computer fraud is any dishonest
misrepresentation of fact
intended to let another to do or
refrain from doing something
which causes loss. Result in
obtaining a benefit by:
Altering in an unauthorized way.
Altering,destroying, suppressing, or
stealing output, usually to conceal
unauthorized transactions.
Altering or deleting stored data
Cyber Terrorism
Cyber Terrorism in general, can be
defined as an act of terrorism
committed through the use of
cyberspace or computer resources.
A cyber terrorist is someone who
intimidates or coerces a government
or organization to advance his or her
political or social objectives by
launching a computer-based attack
against computers, networks, or the
information stored on them.
Cyber Extortion
Cyber extortion occurs when a
website, e-mail server, or computer
system is subjected to or threatened
with repeated denial of service or
other attacks by malicious hackers.
Hackers demand money in return for
Government
Types of Computer
Crimes
Hacking
Hacking in
simple terms
means an illegal
intrusion into a
computer
system and/or
network.
Denial of Service (DoS)
Attack
Act by the criminal, who
floods the bandwidth of the
victim’s network.
In his e-mail box with spam
Cyber Terrorism
Use of Internet base attacks in
terrorist activities.
Software Piracy
Theft of software through the illegal
copying of genuine programs.
Distribution of products intended to
pass for the original.
Virus Dissemination
Malicious
software that
attaches itself
to other
software. (virus,
worms, Trojan
Horse, web
jacking, e-mail
bombing, etc.)
Categories Of Computer
Viruses
Categories of Computer
Viruses
Boot Sector Viruses – infects the
boot record of a hard or floppy disk.
Cluster Viruses – this type of virus
make changes to a disk’s file system.
File-Infecting Viruses – this type of
virus infects program files on a disk
(such a EXE or COM files).
Categories of Computer
Viruses
Worms – a worm is a program
whose purpose is to duplicate itself. It
is commonly spread over the Internet
via e-mail message attachments and
Internet Relay Chat (ICR).
Bombs – this type of virus hides on