Cybercrime Presentation: Types, Prevention, Impact, and Classification

Verified

Added on  2023/01/12

|12
|732
|28
Presentation
AI Summary
This presentation provides a comprehensive overview of cybercrime, addressing its increasing prevalence in the digital age. It begins with an introduction to computer and internet systems, explaining their role in the context of cybercrime. The presentation then defines cybercrime and discusses its various types, including cyberpiracy, cybertrespass, and cybersabotage. It also covers specific examples such as identity theft, online transaction fraud, and the distribution of malicious software. The classification of cybercrime, including crimes against individuals, organizations, and society, is also discussed. The presentation concludes by offering practical prevention strategies, such as educating oneself, avoiding suspicious websites, and using firewall software. References to relevant sources are provided to support the information presented. This assignment is designed to educate individuals about the risks associated with cybercrime and how to protect themselves.
Document Page
CYBERCRIME
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
Computer and internet systems
Cyber crime redundant
List of Different types of Cybercrime
Classification of Cybercrime
Prevention
Conclusion
References
Table of Contents
Document Page
Cyber crime becomes most committed
crime all over the world. It is rapidly
growing with boost in internet (NCA, 2020).
Advance technology plays a supportive role
to cyber crime.
In every 5 second it is committed all over
the world.
INTRODUCTION
Document Page
INTERNET in common language It is said to be
a telecommunication network, which uses
telephone lines, cables, satellites and wireless
connections to connect computers and other
devices to the World Wide Web (Cyber crime,
2020).
For example, when you open your browser
and search for some information in the search
engine (google), it will obviously be a store.
All the files (img sound, video, web page) etc.
Computer and internet
systems
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Arguments for having a category of
computer crime can be advanced from at
least three different perspectives: legal,
moral, and informational or descriptive
(Tavani, H.T. 2000).
The perpetrators of these crimes are called
Cybercriminals (Action Fraud, 2020).
Even a common person can knowingly and
unknowingly do Cybercrime on the internet.
Cyber crime redundant
Document Page
Cyberpiracy - the use of computer
technology to illegally copy software or
distribute copied software.
Cybertrespass - the use of computer
technology to illegally access another’s
computer system.
Cybersabotage - the use of computer
technology to disrupt or destroy computer
system access (Tavani, H.T. 2000).
Three broad groups of criminal
activity
Document Page
Thieves illegally obtain a person's identity
from social networks
Online transaction fraud
Developing or distributing malicious software
Using copyrighted content of a person
Making any inappropriate post
Online purchase or sale of illicit goods
Creating child pornography
Distributing spam (UK cyber-crime victims
lose £190,000 a day, 2019)
List of different types of
Cybercrime
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Crimes against individuals : Such crimes
are committed against a person or their
properties (What is Cyber Crime?, 2020).
Crimes against organizations: Almost all
big companies and organizations focus
more on their online growth. In such a
situation, they also have to deal with
cybercrime.
Offenses against the Society: Crimes
which commit to harm society are offenses
against society.
Classification of Cybercrime
Document Page
On educating yourself
Checking emails or chatting on messenger
Avoid phony websites which ask for your
personal information
Use firewall software (Cyber crime in the
UK – is it is bad as they say or worse?,
2020)
Prevention
Document Page
Under this, power point presentation is based
on various types of cyber crime and measures
to prevent them. In today's digital age the use
of computing devices and internet is at its
peak. In such a situation, it is very important to
have information about cybercrime. However,
after the implementation of the IT Act, many
changes were made in it and in a few years
almost all online activity came under it. This is
also important, if we want to grow digitally,
then we have to reduce the cyber security risk.
Conclusion
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NCA, 2020; Online available through:
https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/cyber-c
rime
Cyber crime, 2020; Online available through:
https://www.victimsupport.org.uk/crime-info/types-crime/cyber-crime
Action Fraud, 2020; Online available through:
https://www.actionfraud.police.uk/
UK cyber-crime victims lose £190,000 a day, 2019; Online available through:
https://www.bbc.com/news/uk-47016671
What is Cyber Crime?, 2020; Online available through:
https://www.bedfordshire.police.uk/information-and-services/Crime/Cyber-c
rime-and-online-safety/What-is-cyber-crime
Cyber crime in the UK – is it is bad as they say or worse?, 2020; Online
available through:
https://www.financierworldwide.com/cyber-crime-in-the-uk-is-it-is-bad-as-th
ey-say-or-worse#.
XpUZl8j7S1s
Tavani, H.T. 2000. Defining the boundaries of computer crime: piracy, break-
ins, and sabotage in cyberspace. ACM SIGCAS Computers and
Society, 30(3), 3-9
References
Document Page
THANK YOU
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]