10
Cybercrimes Name : Aaesha Ebrahim Class: AT3 ID: H00126958

Cybercrimes

  • Upload
    3washyy

  • View
    615

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Cybercrimes

Cybercrimes

Name : Aaesha Ebrahim Class: AT3ID: H00126958

Page 2: Cybercrimes

PowerPoint Guidelines

PiracyPlagiarismSpreading of malicious softwarePhishingIP spoofingCyberstalkingDistribution of indecent or offensive material

Page 3: Cybercrimes

Piracy

It is the act of copying other’s work (Copyrighted material )or reproducing this work without permission from the owner

Page 4: Cybercrimes

Plagiarism

The act of taking someone’s words or ideas as if its yours without crediting the source

Page 5: Cybercrimes

Spreading of malicious softwareOr Malware

Is a software that used to damage, disable, or Obstruct computer systems or network for specific purpose, so any software that brings harm to any computer will be a malicious software or malware. Its include :

Page 6: Cybercrimes

Phishingattempt to gain personal / financial information from individuals, by posing as a legitimate entity in the form of email, broadcast, phone call

Page 7: Cybercrimes

IP spoofing

A technique used to gain a unauthorized access to computers and this happen by replacing an IP address of an IP packet's sender to another machines IP

Example :

Attacker name : TomTarget : DemaTrusted host : Daived

Dema will respond to Tom as her friend Daived She dosen’t know that Tom pretend to be Daived

Page 8: Cybercrimes

CyberstalkingWhen an attacker use the internet or other electronic communication to stalk or harass individuals , by gathering information that is important to those people and harass them

Page 9: Cybercrimes

Distribution of indecent or offensive materialIts an upsetting or insulting contents that are published on media either written or on-line on articles , photographs, films, or websites

Page 10: Cybercrimes