You are on page 1of 26

Computer Crimes

Tharindu Fernando
BSc. Eng (Hons.) – First Class (Moratuwa), AMIE(SL),
University of Vocational Technology CIMA Passed Finalist
Professional Issues in IT
IT 60404
Introduction
• Computer crimes are committed by individuals who possess
comprehensive knowledge on computer technology.
• The prime intention of computer crime is to damage, delete or alter
data which are present in computer systems.
• Any other forms of misusing computers such as electronic fraud, cyber
harassment are also considered as computer related crimes.

2
Cyber Security & Crime
https://www.youtube.com/watch?v=5k24We8pED8

3
Types of Cyber Crimes

4
1) Viruses and Worms
• A computer virus is a malicious software program loaded onto a
computer without the user’s knowledge and performs malicious
actions. Viruses could replicate themselves within a computer system.

• A computer worm is a type of malicious software program which


could self-replicate and infect other computer systems while
remaining active on infected systems. Worms do not need hosts to
operate.

5
Animation Movie on Virus and Worms
https://www.youtube.com/watch?v=c34QwtYI40g

6
2) Malware
• A malware is a software that is specifically designed to disrupt,
damage, or gain unauthorized access to a computer system

• Malwares are typically created with the intention of stealing


data. These software are disguised as harmful pop-ups and the
confidential data are being collected without the awareness of
the user.

7
3) Hacking
• Hacking can be defined as any unauthorized access to a
computer system especially to modify or corrupt data to obtain
personal advantages.

8
Hacking | Example
https://www.youtube.com/watch?v=CV39QzFpJx4

9
4) Software Piracy
• Software Piracy is the unauthorized coping of purchased
software. The distribution of these software on commercial basis
is strictly prohibited and is considered as an illegal act.

• However, it is extremely difficult to stop these pirated software


being distributed around the globe.

10
5) Online Fraud
• Online Fraud is a popular business in the contemporary world to
obtain higher illegal earnings.

• These online frauds could take the form of credit card crimes,
bank crimes, internet scams, identity theft etc.

11
6) Sharing Offensive Content
• This involves threatening and sharing offensive content to other
people.

• These could take the form of nude images, computer generated


images and private images taken by force.

12
10 Cyber Crimes you were committing
https://www.youtube.com/watch?v=qunP0tWu2fo

13
Group Activity:
Discussion

14
1. What is the role of government in cyber security?
2. Can we predict a cyber crime rather than simply
responding to it?
3. What are the measures that could be used to
protect companies from cyber attacks?
4. What areas do you think that the hackers would
target in the future?

15
Where is cyber crime really coming from?
https://www.youtube.com/watch?v=FqrLUtIFVjs

16
Computer Crimes Act No. 24
of 2007

17
Objectives of the Act
• To identify a computer crime in a comprehensive angle.

• To penalize the accused.

• To provide a compensation to the victim.

• To identify the procedure of investigation of computer


crimes.

18
Computer Crimes recognised under the Act
• According to the law, trying to access a computer securely
without proper authorization. Even switching on a computer of
another person without his consent is a crime.
Penalty – Maximum fine of Rs 100,000/- and/or maximum of five-year
imprisonment.

• Accessing a computer securely but with unauthorized access


with the purpose of committing a crime.
Penalty – Maximum fine of Rs 200,000/- and/or maximum of five-year
imprisonment.

19
Computer Crimes recognised under the Act [Cont.]
• Using a computer to perform functions such as,
(i) Impairing the operation
(ii) Altering information
(iii) Using services
(iv) Malfunctioning
without authorization.
Penalty – Maximum fine of Rs 300,000/- and/or maximum of five-year
imprisonment.

20
Computer Crimes recognised under the Act [Cont.]
• If a crime is committed against national security, economy and
public order, Secretary of the relevant Ministry should hand over
a certificate stating the fact of the offense and this can be
presented as evidence for the future proceedings.
Penalty – Maximum of five-year imprisonment.

• Manipulating unlawfully obtained data.


Penalty – Maximum fine between Rs 100,000 to Rs 300,000/- and/or
six-month imprisonment.

21
Computer Crimes recognised under the Act [Cont.]
• Intercepting data illegally to, from or within a computer.
Penalty – Maximum fine between Rs 100,000 to Rs 300,000/- and/or six-
month to three-year imprisonment.
• Usage of illegal devices.
Penalty – Maximum fine between Rs 100,000 to Rs 300,000/- and/or six-
month to three-year imprisonment.
• If a person who has access to a resource and by the contract is not bound to
share access information of the service to another party breaches this
contract, it is an offense.
Penalty – Maximum fine between Rs 100,000 to Rs 300,000/- and/or or six-
month to three-year imprisonment.

22
Computer Crimes recognised under the Act [Cont.]
• If a person attempts to commit any of the above-mentioned crimes,
the person will be liable to a half penalty, it could be a fine and/or
imprisonment specified in that specific crime if it was committed.
• Abetting or conspiring to commit an offence
• If the offence indeed took place, then the penalty is equal to the penalty
amount of the offense being committed. Otherwise one fourth of the
penalty will be addressed.
• The person who committed the crime is liable for a compensation to
be granted to the victim based on the following criteria.
• Value of the Loss or damage caused.
• Value of the Monetary gain.

23
Responsible Authorities
ICTA [Information and Communication Agency of Sri Lanka]

Purpose: Develop the economy of SL with the aid of ICT.

Services:
• Policy formulation, maintenance and updating of the procedures and
policies.
• Monitoring the implementation of the updated procedures and policies
initiated by the government organizations.
• Run certain programs to uplift ICTA in the country.

24
Responsible Authorities
CERT | CC [Sri Lanka Computer Emergency Readiness Team |
Co-ordination Centre]
Purpose: protecting constituent, both by reacting to attacks and by
proactively strengthening security against potential attacks.
Services:
• Responsive services (Remote support only).
• Incident Handling.
• Awareness services.

Source: https://www.cert.gov.lk/services.php
25
Reflections….

26

You might also like