SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Research Assignment
Communication Technologies & Change
Sarah Johnson – u3025130
Tutorial Group #4
Cybercrime is defined as:
‘computer-mediated activities which are either
illegal or considered illicit by certain parties and
which can be conducted through global electronic
networks’
(Yar, 2006, p9)
 Cracking – accessing computer systems without
authority to commit a crime. Includes deliberately corrupting or
erasing information within computer systems, defacing websites, and
running copy-protected programs without a password or valid license
string
 Piracy – copying protected software without
authorisation
 Phreaking – manipulating a phone system using a
computer or other device to obtain free telephone calls
or charge calls to another account
 Cyberstalking – using a computer to harass and
terrorise selected human and institutional targets,
causing them to fear injury or harm
 Cyberpornography – producing and/or
distributing pornography using a computer
 Cyberterrorism – unlawful attacks and threats of
attack by terrorists against computers, networks, and
the information stored therein to intimidate or coerce a
government or its people to further the perpetrator’s
political or social objectives
 Hacker unions or crews (domestic and foreign)
 Organised crime
 Foreign Intelligence Services
 Botnet operators
 Random individuals looking to take advantage
of readily available black (underground)
technologies
(Fujitsu, 2009, p4)
 In 2008, security vendor AVG conducted a survey into global
cybercrime and found that Australia has the highest incidence of
cyber crime in the world with more than 39 per cent of
Australian’s having been the victim of cyber crime
(Fujitsu, 2009, p3)
 The 2005 AusCERT Australian Computer Crime and Security Survey
found that in total, $16.9million was lost by 110 of the Australian
organisations surveyed (Arias, 2007)
 A recent report by the Australian Institute of Criminology found
that cybercrime is costing Australian businesses more than $600
million annually (Edwards, 2009)
The Commonwealth Cybercrime Bill 2001
– covers the following offences:
 Unauthorised access, modification or impairment to commit a
serious offence
 Unauthorised modification of data to cause impairment
 Unauthorised impairment of electronic communications
 Possession of data with intent to commit computer offence
(described as "akin to the more familiar offences of 'going
equipped for stealing' or possession of an offensive weapon")
 Supply of data with intent to commit a computer offence
 Unauthorised access to restricted data
 Unauthorised impairment of data held in a computer disk, credit
card, etc.
(Electronic Frontiers Australia, Inc., 2008)
The Model Criminal Code –
Chapter 4: Damage and Computing Offences
 State & territory regulation of cybercrime
 Contains a range of offences concerned with unauthorised access,
modification and impairment of data
 Further divided into Serious Computer Offences (Division
477) or Other Computer Offences (Division 478)
(Clough, 2010, p44)
For an in-depth exploration of
Cybercrime and the implications it is
having on Australian Society, read
the “Cybercrime” research paper by
Sarah Johnson.
 Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet
Business Law Services, Inc. Available from URL:
http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews
[Accessed 13/11/2010]
 Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.
 Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG
Communications. Available from URL:
http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_
report/ [Accessed 13/11/2010]
 Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia:
EFA, Inc. Available from URL:
http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]
 Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New
Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download
from URL:
http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf
[Accessed 13/11/2010]
 Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America:
ABC-CLIO.
 Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cybercrime
CybercrimeCybercrime
CybercrimeAvinash
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Ppt
PptPpt
Ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Andere mochten auch

Andere mochten auch (12)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Ähnlich wie Cybercrime online presentation

Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhanAhmed Sleem
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global ProblemChristina Bauer
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxmattinsonjanel
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 

Ähnlich wie Cybercrime online presentation (20)

Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cybercrime online presentation

  • 1. Research Assignment Communication Technologies & Change Sarah Johnson – u3025130 Tutorial Group #4
  • 2. Cybercrime is defined as: ‘computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks’ (Yar, 2006, p9)
  • 3.  Cracking – accessing computer systems without authority to commit a crime. Includes deliberately corrupting or erasing information within computer systems, defacing websites, and running copy-protected programs without a password or valid license string  Piracy – copying protected software without authorisation  Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  • 4.  Cyberstalking – using a computer to harass and terrorise selected human and institutional targets, causing them to fear injury or harm  Cyberpornography – producing and/or distributing pornography using a computer  Cyberterrorism – unlawful attacks and threats of attack by terrorists against computers, networks, and the information stored therein to intimidate or coerce a government or its people to further the perpetrator’s political or social objectives
  • 5.  Hacker unions or crews (domestic and foreign)  Organised crime  Foreign Intelligence Services  Botnet operators  Random individuals looking to take advantage of readily available black (underground) technologies (Fujitsu, 2009, p4)
  • 6.  In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime (Fujitsu, 2009, p3)  The 2005 AusCERT Australian Computer Crime and Security Survey found that in total, $16.9million was lost by 110 of the Australian organisations surveyed (Arias, 2007)  A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually (Edwards, 2009)
  • 7. The Commonwealth Cybercrime Bill 2001 – covers the following offences:  Unauthorised access, modification or impairment to commit a serious offence  Unauthorised modification of data to cause impairment  Unauthorised impairment of electronic communications  Possession of data with intent to commit computer offence (described as "akin to the more familiar offences of 'going equipped for stealing' or possession of an offensive weapon")  Supply of data with intent to commit a computer offence  Unauthorised access to restricted data  Unauthorised impairment of data held in a computer disk, credit card, etc. (Electronic Frontiers Australia, Inc., 2008)
  • 8. The Model Criminal Code – Chapter 4: Damage and Computing Offences  State & territory regulation of cybercrime  Contains a range of offences concerned with unauthorised access, modification and impairment of data  Further divided into Serious Computer Offences (Division 477) or Other Computer Offences (Division 478) (Clough, 2010, p44)
  • 9. For an in-depth exploration of Cybercrime and the implications it is having on Australian Society, read the “Cybercrime” research paper by Sarah Johnson.
  • 10.  Arias, M. (2007, March 6) Internet Law – Cybercrime statistics in Australia. Europe: Internet Business Law Services, Inc. Available from URL: http://www.ibls.com/internet_law_news_portal_view.aspx?id=1646&s=latestnews [Accessed 13/11/2010]  Clough, J. (2010) Principles of Cybercrime. United Kingdom: Cambridge University Press.  Edwards, K. (2009, June 9) Cybercrime costs businesses $600m: report. Australia: IDG Communications. Available from URL: http://www.computerworld.com.au/article/306743/cybercrime_costs_business_600m_ report/ [Accessed 13/11/2010]  Electronic Frontiers Australia, Inc. (2008) Cybercrime / Computer Legislation. Australia: EFA, Inc. Available from URL: http://www.efa.org.au/Issues/Privacy/cybercrimeact.html [Accessed 13/11/2010]  Fujitsu (2009, June 26) Submission to the Standing Committee on Communications – New Enquiry into Cybercrime. Australia: Fujitsu Australia Limited. PDF available for download from URL: http://www.aph.gov.au/House/committee/coms/cybercrime/subs/sub13.pdf [Accessed 13/11/2010]  Schell, B. & Martin, C. (2004) Cybercrime: a reference handbook. United States of America: ABC-CLIO.  Yar, M. (2006) Cybercrime and Society. London: SAGE Publications Ltd.