Cybercrimes
Name : Aaesha Ebrahim Class: AT3ID: H00126958
PowerPoint Guidelines
PiracyPlagiarismSpreading of malicious softwarePhishingIP spoofingCyberstalkingDistribution of indecent or offensive material
Piracy
It is the act of copying other’s work (Copyrighted material )or reproducing this work without permission from the owner
Plagiarism
The act of taking someone’s words or ideas as if its yours without crediting the source
Spreading of malicious softwareOr Malware
Is a software that used to damage, disable, or Obstruct computer systems or network for specific purpose, so any software that brings harm to any computer will be a malicious software or malware. Its include :
Phishingattempt to gain personal / financial information from individuals, by posing as a legitimate entity in the form of email, broadcast, phone call
IP spoofing
A technique used to gain a unauthorized access to computers and this happen by replacing an IP address of an IP packet's sender to another machines IP
Example :
Attacker name : TomTarget : DemaTrusted host : Daived
Dema will respond to Tom as her friend Daived She dosen’t know that Tom pretend to be Daived
CyberstalkingWhen an attacker use the internet or other electronic communication to stalk or harass individuals , by gathering information that is important to those people and harass them
Distribution of indecent or offensive materialIts an upsetting or insulting contents that are published on media either written or on-line on articles , photographs, films, or websites