Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Web based criminal activity

Traditionally, the term “computer crime” usually referred


to the theft of computers or computer components
Then came : cyberage
New asset : Information
In 2011, e-commerce amounted to nearly $200 billion in
the United States alone.
 16.1 percent increase over 2010 figures
Legislative bodies have been slow to respond to the
potentiality of contemporary computer crime in the
twenty-first century
The marriage of computer and
telecommunications has resulted in an explosion
of the crime
Impression of anonymity
Recent cases indicate that computer dependency and
globalization of communication have been exploited
by individual, group, and government hacking
entities
Other implications of computer crime include
1. financial losses,
2. personal security (i.e., identity theft),
3. industrial espionage,
4. international security,
5. public safety
Six categories of online crime

Interference with lawful use of computers—DOS


attacks, viruses, worms, other malware,
cybervandalism, cyberterrorism, spam, etc.
Theft of information and copyright infringement—
industrial espionage, ID theft, ID fraud, etc.
Dissemination of contraband or offensive materials
—pornography, child pornography, online gaming,
treasonous or racist material, etc.
Threatening communications—extortion,
cyberstalking, cyberharassment,
cyberbullying, etc.
Fraud—auction fraud, credit card fraud, theft of
services, stock manipulation, etc.
Ancillary crimes—money laundering, conspiracy,
etc.
LIMITLESS

While the impact of a traditional mail bomb was


limited to the physical area surrounding the
packaging, the implications of e-mail bombs are
limitless in their application and may include a
complete dismantling of a company’s informational
infrastructure.

You might also like