Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 15

INDEX :

COMPUTER CRIME
INTRODUCTION
 Computer crime or cybercrime is a form
of crime where the internet or computer are
used as a medium to commit crime.
 Kejahatan komputer atau cybercrime
merupakan bentuk kejahatan di mana
internet atau komputer yang digunakan
sebagai media untuk melakukan tindakan
kejahatan.
Types of Computer Crime
 HACKING
 VIRUS DISSEMINATION
 SOFTWARE PIRACY
 CREDIT CARD FRAUD
 NET EXTORTION
 PHISHING
 SPOOFING
 NET EXTORTION
Hacking
 Hacking in simple terms means illegal intrusion into a
computer system without the permission of the
computer owner/user.
(Hacking dalam hal mudah bererti intrusi haram ke
dalam sistem komputer tanpa kebenaran daripada
pemilik komputer / pengguna )
 Hacking can cause damage to computer--based
property such as files, web pages or software.
 The person who indulges in this activity is called a
hacker´.
VIRUS DISSEMINATION
 Malicious software that attaches itself to
other software.(Perisian yang
berbahaya yang menempel pada
perisian lain. )

 Exp:-Virus, worms, Trojan Horse, are


the malicious software's.
SOFTWARE PIRACY
 Theft of software through the illegal copying
of genuine programs or the counterfeiting
and distribution of products intended to pass
for the original. (Pencurian peranti perisian
melalui penyalinan haram program asli atau
pemalsuan )
 Exp : End user copying, Illegal downloads
from the internet etc
CREDIT CARD FRAUD
 If electronic transactions are not secured the
credit card numbers can be stolen by the
hackers who can misuse this card by
impersonating the credit card owner.
 (Jika transaksi elektronik tidak terjamin
nombor kad kredit boleh dicuri oleh hacker
yang boleh menyalahgunakan kad ini dengan
menyamar sebagai pemilik kad kredit )
PHISHING
 Phishing is the criminally fraudulent process
of attempting to acquire sensitive information
such as user names, passwords and credit
card details by masquerading as a
trustworthy entity in an electronic
communication.
 Phishing adalah proses jenayah penipuan
yang cuba untuk mendapatkan maklumat
sensitif as user names, kata laluan dan
butiran kad kredit dengan menyamar.
Spoofing
 Getting one computer on a network to
pretend to have the identity off another
computer, usually one with special
access privileges ,so as to obtain access
to the other computers on the network.
 akses kepada komputer lain pada
jaringan
NET EXTORTION
 Copying the companys confidential data
in order to extort said company for
huge amount.
 Menyalin data rahsia company
Measures To Curb The Crime.
A. Encryption
for protecting data in transit.
Plain text (readable) can be converted to cipher
text (coded language) by this method and the
recipient of the data can decrypt it language)
by converting it into plain text again by using
private key.
This way except for the recipient whose
possessor of private key to decrypt the data,
no one can gain access to the sensitive
information.
B) Firewalls
 It creates wall between the system and
possible intruders to protect the classified
documents from being leaked or accessed.
 It would only let the data to flow in computer
which is recognized and verified by one’s
system.
 It only permits access to the system to ones
already registered with the computer.
C) Digital Signature:
 Are created by using means of
cryptography by applying algorithms.
 This has its prominent use in the
business of banking where customer’s
signature is identified by using this
method before banks enter into huge
transactions.
D) Synchronized Passwords
 Voice, fingerprint identification or retinal
and biometric recognition etc. to impute
passwords and pass phrases of a user
are used.

You might also like