SlideShare a Scribd company logo
1 of 23
COMPUTER CRIMES TOP 5
5
Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
4
Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
3
Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
2
Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
1
Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
“Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 
Thank You 

More Related Content

What's hot (20)

Cyber threats
Cyber threatsCyber threats
Cyber threats
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Viewers also liked

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talagaMar Soriano
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1Mar Soriano
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2Mar Soriano
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talagaMar Soriano
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOYMar Soriano
 

Viewers also liked (9)

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Robot Teacher
Robot TeacherRobot Teacher
Robot Teacher
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 

Similar to Top 5 Computer Crimes

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 

Similar to Top 5 Computer Crimes (20)

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security
Mobile securityMobile security
Mobile security
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Information security
Information securityInformation security
Information security
 

More from Mar Soriano

Windows evolution
Windows evolutionWindows evolution
Windows evolutionMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryMar Soriano
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphoneMar Soriano
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1Mar Soriano
 
Space elevator sarah final
Space elevator sarah finalSpace elevator sarah final
Space elevator sarah finalMar Soriano
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can rideMar Soriano
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can rideMar Soriano
 
Robot teacher123final na
Robot teacher123final naRobot teacher123final na
Robot teacher123final naMar Soriano
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 

More from Mar Soriano (20)

Windows evolution
Windows evolutionWindows evolution
Windows evolution
 
FLYING CAR
FLYING CARFLYING CAR
FLYING CAR
 
Google’s Car
Google’s CarGoogle’s Car
Google’s Car
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Water mill
Water millWater mill
Water mill
 
Transformer1
Transformer1Transformer1
Transformer1
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatory
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Transformer1
Transformer1Transformer1
Transformer1
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphone
 
Jean
JeanJean
Jean
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
Space elevator sarah final
Space elevator sarah finalSpace elevator sarah final
Space elevator sarah final
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
Robot teacher123final na
Robot teacher123final naRobot teacher123final na
Robot teacher123final na
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Top 5 Computer Crimes

  • 2.
  • 3. 5
  • 4. Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
  • 5. Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
  • 6. Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
  • 7.
  • 8. 4
  • 9. Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
  • 10. In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
  • 11.
  • 12. 3
  • 13. Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
  • 14. Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
  • 15.
  • 16. 2
  • 17. Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
  • 18.
  • 19. 1
  • 20. Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
  • 21.
  • 22. “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 