You are on page 1of 31

COMPUTER CRIME

Prepared By: Mohammad Tariq Sadat & Ahmad Zia

Agenda
 What

is Computer Crime? & History

 Background  Potential  Types

Criminals

of Computer Crime Computer Crime

 Combating

1. Definition

What is Computer Crime?


Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, acceleration of the crime or it may be the target.

2. Background & History

Evolution of the Information Age


 Growth  Internet  The

Inevitable

2. Background & History

Escalation and Frequency


5-year increase
2500 2000 1500 1000 500 0 1990 1995

2. Background & History

Escalation and Frequency


FBI Computer Crimes Division Reports: 5 security breaches every day 75% annual increase in recent years

2. Background & History

Escalation and Frequency


Department of Defense Study
7 747

786 3
# of successful system attacks (8 3 attempts) # of detections (out of 786 successful attempts)

I. Background & History

2. Background & History

3. Potential Criminals

Employees/Ex-employees
Users Analysts Programmers
% 8 %

% of crimes committed

4. Types of Computer Crime

1. Hacking
The activity of breaking into a computer system to gain an unauthorized access is known as hacking.

4. Types of Computer Crime

2. Phishing:
Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source.

4. Types of Computer Crime

3. Viruses
Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users.

4. Types of Computer Crime

4. Cyber stalking:
The use of communication technology, mainly the Internet, to torture other individuals is known as cyber stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber stalking activities.

4. Types of Computer Crime

5. Identity Theft:
This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own.

4. Types of Computer Crime

6. Denial of Service Attack:


This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

4. Types of Computer Crime

7. Spam:
The most common type of cyber crime is spam. While email spam laws are fairly new, there have been laws on the books regarding "unsolicited electronic communications" for many years.

4. Types of Computer Crime

8. Fraud:
Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address.

4. Types of Computer Crime

9. Cyber Bullying:
Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.

4. Types of Computer Crime

10. Drug Trafficking:


Most of the time drug trafficking is happening over the Internet. Many traffickers use encrypted email or password-protected message boards to arrange drug deals.

4. Types of Computer Crime

11. Cyber Terrorism:


There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking into a government website, other times it's just a group of like-minded Internet users who crash a website by flooding it with traffic. No matter how harmless it may seem, it is still illegal.

4. Types of Computer Crime

12. Piracy:
Far and away the most talked about form of cyber crime is robbery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.

4. Types of Computer Crime

12. Piracy:
Downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.

4. Types of Computer Crime

13. Dumpster Diving:


Dumpster diving, or trashing, is a name given to a very simple type of security attack searching through materials that have been thrown away

4. Types of Computer Crime

14. Harassment:
A particularly nasty kind of personnel breach we've seen lately is harassment on the Internet. Sending threatening email messages and slandering people on bulletin board systems and newsgroups is all too common.

5. Combating Computer Crime

Reasons of Computer Crime


First: More Rewards Most businesses offer the most reward for the crime. Second: Ease of Attack Large businesses usually employ large amounts of people, any of whom can potentially attack internal systems. Third: Little Fear of the Consequences: Having little fear of being caught and prosecuted.

5. Combating Computer Crime

Combating Model
1. Awareness or Education: It means

that sufficient awareness should be provided to the society, utilizing different channels of Mass media to inform and educate people about Computer Crimes.

5. Combating Computer Crime

Combating Model
2. Passing Laws and Regulations: The government of any country is responsible to pass effective legislations against Computer Crime. These legal documents must be publicized in order to gain larger impact.

5. Combating Computer Crime

Combating Model
3. Prosecution and Punishment:
In order to prevent such crimes in the future the law enforcement agencies must work hard to deal with Computer Crime Cases in a professional way and bring those criminal to justice. The punishment should be exercised in a fair and strict manner.

Citations
1. State of New Jersey Commission of Investigation, Computer Crime, a Joint Report, June . 1 Ronald B. Standler, Computer Crime, Copy Right 1999, Michael Kunz & Patrick Wilson, Computer Crime and Computer Fraud, Fall 4. Wikipedia the Free Encyclopaedia www.mariosalexandrou.com/definition/computer-crime.asp Free Online Dictionary. Paul Mobbs, Computer Crime, the Law on the Misuse of 3. Computers and Networks, Apr, Manali Oak, Types of Computer Crimes, Buzzle.com www.ehow.com/facts_497 64_different-types-cybercrime.html David Icove, Karl Seger & William VonStorch, Computer Crime A Crimefighters Handbook, 1st Edition August 1995. Jason Upchurch, Combating Computer Crim, September, 6, 1.

Thank You!

You might also like