Crimes of The New Millenium: I. Cybercrime

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

CRIMES OF THE NEW MILLENIUM

I. CYBERCRIME-

a. Tool

b. Target
Modes and Manner of Committing Cyber Crime:
– hacking – Trojan attacks
– theft of information contained in – internet time theft
Electronic Form – web jacking
– e-mail bombing – phishing
– data diddling – cyber stalking
– salami attack – Software Piracy
– denial of service attack – cyber theft
– virus or worm attacks – cyber defamation/ libel
– logic bomb
Classifications of Cyber Crime:
– 1. Against Individuals

– a. against person
– harassment via e-mails -fraud and cheating
– cyber-stalking

– dissemination of obscene material

– defamation

– unauthorized control/ access over computer system


b. property of individual

– computer vandalism

– transmitting virus

– unauthorized control/ access over computer system

– intellectual property crimes

– internet time thefts


2. Against Organization

a. Government

b. Firm, Company, Group of individuals


– unauthorized control/ access over computer system

– possession of unauthorized information

– cyber terrorism against the government organization

– distribution of pirated software etc.


3. Against Society at large

a. pornography (child pornography)

b. polluting the youth through indecent exposure

c. trafficking

d. financial crimes

e. sale of illegal articles

f. online gambling

g. forgery
Reasons why cybercrimes are not reported:

 to save personal embarrassment and public contempt

 it could boomerang to business refutes

 the cost maybe more expensive than damage seek to recover

 lack of specific law penalizing computer crimes

 hackers are sometimes more intelligent than law enforcement


II. CYBER VANDALISM
Who are cyber vandals?

a. Professional Developers

b. Researchers

c. Skilled and inexperienced youth


Threats of cyber vandalism:

– It affects your digital identity and image

– If you have a business, it loses your customers

– It ruins your overall reputation

– Extra expenses, time and labor are involved

– Reduces your profits


III. TRANSNATIONAL ORGANIZED
CRIME
Cyber criminal roles in organized crime:

Programmers System hosts and providers

Distributors Cashiers

IT experts Money mules

Hackers Tellers

Fraudsters Leaders
IV. CYBERWARFARE
Cyberwarfare involves the following attack methods:

 Sabotage- Military and financial computer systems are at risk

 Espionage and/or security breaches-These illegal exploitation methods are used


to disable networks, software, computers or the Internet to steal or acquire
classified information from rival institutions or individuals for military, political
or financial gain.
How to protect yourself against cybercrime?

1. Use a full-service internet security suite

2. Use strong passwords

3. Keep your software updated

4. Manage your social media settings

5. Strengthen your home network


6. Talk to your children about the internet

7. Keep up to date on major security breaches

8. Take measures to help protect yourself against identity theft

9. Know that identity theft can happen anywhere

10. Keep an eye on the kids

11. Know what to do if you become a victim

You might also like