Professional Documents
Culture Documents
INTRODUCTION
The computer age introduces a new perspective of
human existence, I may say that it lessens the sense
of morality and increases opportunities of virtual
crimes.
HISTORICAL DEVELOPMENT OF COMPUTER
BRIEF HISTORY OF INTERNET
BRIEF HISTORY OF INTERNET
BRIEF HISTORY OF INTERNET
8
”
CRIMES ATTRIBUTED
9
10
COMMITTING CYBERCRIME
• Hacking • Logic Bombs
• Theft of information • Trojan Attack
• E-mail Bombing • Internet Time Theft
• Data Diddling • Web Jacking
• Salami Attack
• Denial of Service
Attack
• Virus or Worm Attack
Presentation title 12
CYBERCRIME 13
• On April 22, 2014 the law was declared valid and enforceable
27
”
CRIMES ATTRIBUTED
28
29
COMMITTING CYBERCRIME
• Hacking • Logic Bombs
• Theft of information • Trojan Attack
• E-mail Bombing • Internet Time Theft
• Data Diddling • Web Jacking
• Salami Attack
• Denial of Service
Attack
• Virus or Worm Attack
Presentation title 31
HACKING
THEFT OF INFORMATION
Data theft – also known as information
theft – is the illegal transfer or storage
of personal, confidential, or financial
information. This could include
passwords, software code or
algorithms, and proprietary processes
or technologies.
EM 33
AI
L
BO
MB
IN
G
Presentation title 34
Presentation title 35
36