Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Different Types of Computer Fraud and Cybercrimes, Lecture notes of English

Information SecurityComputer NetworksData SecurityCybercrime Investigation

An overview of various computer frauds and cybercrimes, including hacking, phishing, identity theft, digital piracy, social engineering, cyber-harassment, cyber defamation, cybersex, and child pornography. It also discusses internet threats such as malware, viruses, worms, trojans, spyware, and adware.

What you will learn

  • What are the different types of computer fraud?
  • What is cyberbullying and how does it differ from cyberstalking?
  • What is the difference between a virus and a worm in the context of computer security?

Typology: Lecture notes

2020/2021

Uploaded on 04/29/2022

soleres-andrea
soleres-andrea 🇵🇭

3 documents

1 / 2

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Different Types of Computer Fraud and Cybercrimes and more Lecture notes English in PDF only on Docsity! SUBJECT : Empowerment Technology TOPIC/s : Computer Crimes, Fraud and Internet Threats. OBJECTIVE/s : Enumerate and explain the different computer crimes and fraud. : Appreciate the importance of knowing this cybercrime activities. : Visualize the cybercrime activities in our society through poster making. TYPE OF ACTIVITY : Concept Notes and Poster Making Introduction The advancement of ICT technologies have opened a vast opportunity for everyone, young and adult to use cheaper mobile gadgets and portable computers with great features. This has created what we call the online community. An online community is a community that is formed on the internet where a group of people are interacting, sharing, and working toward a common goal. In an online community, members interact via social networks. Internet security refers to computer security specifically related to the internet, often involving browser security but also network security on a more general level as it applies to other applications or other operating systems on a whole. Its objective is to establish rules and measures to use against attacks over internet. Computer Fraud uses computers, the internet, internet devices and internet services to deceive people, companies, or government agencies of money, revenue, or internet access. Republic Act No. 10175 – Cybercrime prevention act of 2012. Aims to address legal issues concerning online interactions and internet. Cyber – means relating to, or involving computer or computer network. Cyberspace – refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. Cybercrime – refers to the criminal activities carried out by means of computers or the internet. Types of Computer Fraud and Crimes 1. Hacking – refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. 2. Phishing – is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. 3. Illegal Downloading – refers to obtaining files that you do not have the right to use from the Internet. 4. Digital Piracy – refers to the practice of illegally copying and selling digital music, video, computer software, etc. 5. Identity Theft - is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss 6. Distributed Denial of Services (DDoS) – is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 7. Social Engineering – the art of manipulating people so they give up confidential information. 8. Trojan Horse – a booby trap in the form of an email attachment. If you download the attachment, it unleashes a virus on your computer. The virus may wipe files from system and suck up personal data for identity thieves. 9. Cyber-Harassment – can be Cyberstalking and Cyberbullying. These are not about stealing money or identities. They are personal attacks, targeting someone online just as some bullies and stalkers target victims offline. a. Cyberbullying - is the use of technology to torment, threaten, harass or embarrass another person using the internet or other technologies such as posting embarrassing pictures on social media or sending hurtful or threatening text messages. b. Cyberstalking – a crime using internet, email, or other types of electronic communications to stalk, harass, or threaten another person. It often involves harassing emails, instant or text messages, or social media posts, or creating websites for the sole purpose of tormenting the victim. c. Cyber Defamation – is an unprivileged false statement of fact which tends to harm the reputation of a person or company Two types of Defamation: 1. Slander – Verbal 2. Libel – Written d. Cybersex – is a virtual sex encounter in which two or more people (connected remotely via internet) send each other sexually explicit contents or sexually explicit acts e. Child Pornography – is a form of child sexual exploitation 10. 419 Scam – is named for a section of the Nigerian legal code, because it often involves emails sent from Nigeria. 11. Intrusion – a computer system is compromised by breaking the security of such a system or causing it to enter into an insecure state or other users can gain unauthorized access to a system. The system data are accessed without permission.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved