You are on page 1of 20

Student :Jalba Ion

Group:1804
 1.Introduction
2.Hystory of Cyber Crimes
3.Categories of Cyber Crimes
4.Types of Cyber Crimes
5.Cyber Security
6.Advantages of Cyber Security
7.Safety Types of Cyber Crime
8.CyberCrime in Moldova
9.Conclusion
 In the tech-savvy world of 21 st Century every one is
engaged with internet through
whatsapp,twitter,facebook,net-banking.
-Some criminal minded persons commit crimes
here,which is included under cyber crime.
-So we should be aware about crimes happening
around in the cyber space
 The computer may have been
used in the commission of a
crime, or it may be the target
. Cybercrime is defined as a
crime in which a computer is
the object of the crime
(hacking, phishing, spamming)
or is used as a tool to commit
an offense (child pornography,
hate crimes). First recorded
cyber crime took place in 1820.
 1971-John Draper uses toy whistle from Cap’n
Crunch cereal box to make free phone calls.
1973Teller at New York Dime Savings Bank uses computer to fun
nel $1.5 million into his personal bank account
1983UCLA student used a PC to break into the Defense Departme
nt’s international communication system.
1994Russian hackers steal $10 million from Citibank and distribut
e the money to bank accounts around the world.
1995-European Trekies / hackers compromised Newscorp
/ SKY‐TV to allow illegal access to Star Trek re‐runs in Germany
2002-British
hacker accessed 97 US Air Force, Army, Navy, NASA, Pentagon,
and DoD computers – looking for evidence of UFOs.
 1. The Computer as a weapon
Using a computer to commit real world crime
Cyber terrorism and credit card fraud.
2. The Computer as a target
Using a computer to attack another computer
 *Hacking
*Denial of service attack
*Virus Dissemination
*Computer Vandalism
*Cyber Terrorism
*Software Piracy
 1.Cyber Crime has recently surpassed illegal drug
traffincking as a criminal money-maker
2.A personal identity is stolen once every 3.1 seconds as
a result of cyber crime.
3.Nearly half of all cybercrimes are commited against
small businesses.
4.Some countries,including the UK,see cyber crime
surpassing all other traditional crime.
 The Most Expensive Computer Virus Ever Caused $38.5
Billion In Damages. This computer virus is named
“MyDoom,” and is considered to be the world’s most
expensive computer virus ever. This virus was first
discovered back in 2004, and it spread quickly. It not only
became the most expensive virus, but also the fastest
spreading virus. The virus was transmitted through a spam
e-mail.
 Some Cybercrimes Are Inside Jobs – 59% Of Employees
Steal Data When They Quit Or Get Fired. Sometimes,
insider threats happen on purpose – employees intend to
harm the company. Other times, insider threats happen by
accident – an employee accidentally releases information .
 Technology and criminology have always been
closely linked
 Technology can be used by crime fighters and
lawbreakers
 As technology progresses, it facilitates new forms of
behavior, including new crimes.
 1.Use antivirus softwares
2.Insert firewalls
3.Uninstall unnecessary
4.Maintain backup
5.Check security settings
6.Stay anonymous-choose a genderless screen name
7.Never give your full name or address to strangers
8.Learn more about internet privacy
 1.Defend us from Critical Attacks
2.Browse the safe website
3.Internet security process all the incoming and
outgoing data on our computer
Be careful of links and attachments in
e-mails.
Use different passwords for online accounts.
Check websites security.
If you are ever unsure about
something online, do your research.
Anti-virus software.

- think of your favourite book/film/song/poem

- choose a line from it

- take the first letters of each word

- change some of the letters for CAPITALS, numb3r5 and


punctuat!on
 In the first 6 months of 2018 in Moldova have been started
60 criminal cases of cyber crime.
-6 cases of violation of correspondence secrets
-7 cases of infringement of copyright and related rights
-14 cases of child pornography
-3 cases of disruption of computer system operation
 -The key to protecting yourself is being aware
Not all ‘cybercriminals’ are hackers
-There is a whole other world that exist in
cyberspace…make sure that your information travels
safely.
-Stay secure!

You might also like