Sunteți pe pagina 1din 2

TOPIC: CYBER CRIMES Introduction It is a criminal activity committed on the internet.

It describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money. 2. Body A. Cybercrimes against person 1. Transmission of child pornography a. Involves distributing, trafficking, dissemination and posting any child-related obscene
material. i. They post obscene photos and videos of underage teenagers in the internet for free or charge.

2. Cyber harassment a. Involves sexual, religious or racial, violating citizen privacy. i. They tag someone picture from a social network such as Facebook, and post it to the inappropriate site. ii. Social network, especially women Facebook user will have a problem where they been disturb by a stranger who post obscene word, harsh word and other sensitive issue. B. Cybercrimes against government 1. Cyber theft a. Using computer or communication system to steal or information. i. Cracks into bank system and transferring moneys to their account bank. It means it is an illegally transferred. ii. Phone phreaks - By gaining access to an organizations telephone switchboard (PBX) individuals or criminal organizations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. iii. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. iv. Credit fraud - Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will be used by the hacker for his own means. b. Cyber terrorism a. Used by individuals or groups threaten the international government and local citizens of a country.

Cracks into government or military confidential data which then starting a war between countries. C. Provide a protection on personal computer 1. Antivirus and antispyware software a. Used a full protection antivirus which can get it by free or paid to protect the personal computer. 2. Firewalls a. Protects from unauthorized access to your storage when go online. i. Only connect to a trusted network and not provide any privacy data. 3. Cyber ethics and laws a. Follow cyber ethics law and cyber law i. Reducing the cybercrimes as well protecting your personal data in your laptop or online storage. References Shaikh Mohsin Ayaz (2006, June 22). Cyber Crimes and Solution. Retrieved on July 4, 2012, from http://www.selfseo.com/story-17135.php Maya Babu (2004, October 11). What is Cybercrime? Retrieved on July 4, 2012, from http://www.crime-research.org/analytics/702/ Crime in the Digital Age by Peter Grabosky and Russell Smith, Sydney: Federation Press, 1998 (copublished with the Australian Institute of Criminology)

i.

S-ar putea să vă placă și