3. WHAT IS COMPUTER CRIME
• ALTERNATIVELY REFERRED TO AS CYBER CRIME, E-CRIME, ELECTRONIC CRIME,
OR HI-TECH CRIME. COMPUTER CRIMES AN ACT PERFORMED BY A
KNOWLEDGEABLE COMPUTER USER, SOMETIMES REFERRED TO AS
A HACKER THAT ILLEGALLY BROWSES OR STEALS A COMPANY'S OR INDIVIDUAL'S
PRIVATE INFORMATION. IN SOME CASES, THIS PERSON OR GROUP OF
INDIVIDUALS MAY BE MALICIOUS AND DESTROY OR OTHERWISE CORRUPT THE
COMPUTER OR DATA FILES.
4. COMPUTER CRIME
• IT CAN BE SEEN AS TWO WAYS, WHERE A COMPUTER SYSTEMS IS THE TARGET OF
THE CRIME (E.G HACKING)
• WHERE COMPUTER TECHNOLOGY IS USED TO ENABLE OR COMMIT CRIME
5. TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
PHISHING
THE FRAUDULENT PRACTICE OF
SENDING EMAILS PURPORTING TO
BE FROM REPUTABLE COMPANIES IN
ORDER TO INDUCE INDIVIDUALS TO
REVEAL PERSONAL INFORMATION,
SUCH AS PASSWORDS AND CREDIT
CARD NUMBERS.
BOTS
A ROBOT THAT HAS BEEN
COMPROMISED (OR INFECTED) AND
CAN BE CONTROLLED REMOTELY
WHEN IT IS ON AND CONNECT TO
THE INTERNAT .
A BOT CAN ALSO BE CALLED A
ZOMBIE.
COMPUTER VIRUS
A COMPUTER VIRUS IS MALWARE
THAT IS WRITTEN TO DISRUPT THE
NORMAL FUNCTIONING OF A
PERSONS COMPUTER, WITH OUT
THEIR KNOWLEDGE OR CONSENT.
IT CAN BE USED TO TURN YOUR
COMPUTER INTO A BOT
6. TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
Spoofing
COMPUTER
WORM
SPYWARE
KEY
BLOG
GER
TROJA
N
7. CATERGORIES OF COMPUTER CRIME
HARRASMENT
WHEN YOU ARE CONINOUSLY
BOTHERED WITH MASSEGES OR
DATA THAT YOU DO NOT WANT TO
RECEIVE.
OR DATA WHICH SPREADS FALSE OR
POTENTIALLY HARMFUL
INFORMATION ABOUT YOU TO
OTHERS
CYBER ATTACKS
IS AN ATTACK TO THE
INFRUSTRUCTURE OF THE WEB
ITSELF. E.G.
*BUSINESS CYBER ATTACKS THAT
CAUSES PROBLEMS WITH
CONDUCTING BUSINESS ONLINE.
*WEBSITE CYBER ATTACKS.
9. COMPUTERS AND THEFT
BANDWIDTH
DEFINED AS THE AMOUNT OF
DATA THAT CAN BE TRANSMITTED
IN A FIXED AMOUNT OF TIME.
IDENTITY THEFT
THE FRAUDULENT ACQUISITION
AND USE OF A PERSON'S PRIVATE
IDENTIFYING INFORMATION,
USUALLY FOR FINANCIAL GAIN.
MONEY
MONEY IS USUALLY STOLEN BY
USING ONE OF THE METHODS WE
HAVE DESCRIBED, WHICH IS TO GET
CONFIDENTIAL INFORMATION THAT
ALLOWS ACCESS TO BANKS
ACCOUNTS OF A BUSINESS OR AN
INDIVIDUAL.
COPY RIGHTED
MATERIAL
10. PROTECTION FROM COMPUTER CRIME
ASSUME NOTHING
DON’T ASSUME YOU ARE SAFE AND
PROTECTED AND DON’T ASSUME
THAT THE STRANGER SENDING
YOU THE EMAIL IS WHO OR WHAT
THEY SAY THEY ARE
BELIEVE IN NO ONE
CHECK UP ON THE PEOPLE YOU ARE
INTERACTING WITH, FOR EXAMPLE,
IS THE PERSON ASKING FOR YOUR
PASSWORD TO FIX YOUR
COMPUTER IS AN ICT/IT SPECIALIST
OR SOMEONE ELSE
CHECK EVERYTHING
BAD SPELLING AND GRAMMER AND
INCORRECT WESITES URLS ARE
THINGS THAT YOU CAN CHECK TO
DECIDE IF AN EMAIL TO A WEBSITE
IS LEGITE OR BELIEVABLE
A
B
C
11. SOFTWARE YOU NEED TO HELP YOU PROTECT YOUR
COMPUTER
ANTI-VIRUS SOFTWARE IS A
PROGRAM OR SET OF PROGRAMS
THAT ARE DESIGNED TO PREVENT,
SEARCH FOR, DETECT, AND
REMOVE SOFTWARE VIRUSES, AND
OTHER MALICIOUS SOFTWARE LIKE
WORMS, TROJANS, ADWARE, AND
MORE.
IS A NETWORK SECURITY SYSTEM
DESIGNED TO PREVENT
UNAUTHORIZED ACCESS TO OR
FROM A PRIVATE
NETWORK. FIREWALLS CAN BE
IMPLEMENTED AS BOTH HARDWARE
ANDSOFTWARE, OR A
COMBINATION OF BOTH
TYPE OF SOFTWARE THAT IS
DESIGNED TO DETECT AND REMOVE
UNWANTED SPYWARE
PROGRAMS. SPYWARE IS A TYPE OF
MALWARE THAT IS INSTALLED ON A
COMPUTER WITHOUT THE USER'S
KNOWLEDGE IN ORDER TO COLLECT
INFORMATION ABOUT THEM.
ANTI-VIRUS SOFTWARE FIREWALL SOFTWARE ANTI-SPY SOFTWARE