0% found this document useful (0 votes)
959 views

07 Poster Presentation Example

This document discusses cybercrime, including its introduction, background, types, and recommendations for protection. Cybercrime refers to illegal acts using computer technology and includes fraud and identity theft. Early instances involved hackers accessing networks for thrills or information. Criminals now infect systems with viruses. There are four main types of cybercrime: unauthorized computer use, fraudulent records, altered/destroyed files, and theft. Protective measures for businesses include log-on procedures, securing data, and virus protection. For individuals, careful information sharing and self-protection are recommended. Authorities need stricter laws and increased public awareness of cybercrime.

Uploaded by

Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
959 views

07 Poster Presentation Example

This document discusses cybercrime, including its introduction, background, types, and recommendations for protection. Cybercrime refers to illegal acts using computer technology and includes fraud and identity theft. Early instances involved hackers accessing networks for thrills or information. Criminals now infect systems with viruses. There are four main types of cybercrime: unauthorized computer use, fraudulent records, altered/destroyed files, and theft. Protective measures for businesses include log-on procedures, securing data, and virus protection. For individuals, careful information sharing and self-protection are recommended. Authorities need stricter laws and increased public awareness of cybercrime.

Uploaded by

Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CYBERCRIME

INTRODUCTION
• Cyber Crime: “any illegal act in which knowledge of computer
technology is used to commit the offense” (Quarantiello, 1996)
• Examples: fraud
identify theft
• Other terms: cybercrimes, computer crimes & technological
crimes

BACKGROUND
• First instance of cybercrime - hackers break into computer
networks
• Reasons: RECOMMENDATIONS
the thrill of accessing high-level security networks
OR  open any attachment of unidentified
to gain sensitive, classified material. emails.
• Criminals infect computer systems with computer viruses  log in online services (such as e-
• Result: banking) via hyperlinks attached in
breakdowns in personal and business computers emails.
 reveal your login password for you
• The “digital divide” provides “safe havens” for cyber‐criminals accounts.
(Broadhurst, 2006)
 follow security instructions given by
your organization
DISCUSSION
The Four Types of Cyber Crime:
1. Unauthorized use of computer-related assets
2. Introduction of fraudulent records or data into a computer system
3. Alteration or destruction of information or files
4. Theft of money, financial instruments, property, services, or data CONCLUSION
(Quarantiello, 1997) • cybercrimes getting
Protective Measures for Business stronger and more
• Log-on procedures organized
• Securing data from theft • domestic law is not
• Guarding against data manipulation effective – each country
• Protection against viruses. has different laws
Protective Measures for Individuals • need stricter laws
• Careful information dissemination, maintaining privacy and E-mail • must raise people’s
security. awareness about this
• Self-protective measures (e.g., in the work place)
• Authorities need to investigate the reasons for cybercrime

LSC 2103 28 March 2020 Presenters: Name 1, Name 2 and Name 3. CRN XXXXX

You might also like