SlideShare a Scribd company logo
1 of 23
COMPUTER CRIMES TOP 5
5
Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
4
Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
3
Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
2
Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
1
Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
“Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 
Thank You 

More Related Content

What's hot

Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

What's hot (20)

Cyber threats
Cyber threatsCyber threats
Cyber threats
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Viewers also liked

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
Mar Soriano
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
Mar Soriano
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
Mar Soriano
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
Mar Soriano
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
Mar Soriano
 

Viewers also liked (9)

Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
 
Robot teacher123final na talaga
Robot teacher123final na talagaRobot teacher123final na talaga
Robot teacher123final na talaga
 
Robot Teacher
Robot TeacherRobot Teacher
Robot Teacher
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 

Similar to Top 5 Omuter

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 

Similar to Top 5 Omuter (20)

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security
Mobile securityMobile security
Mobile security
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Information security
Information securityInformation security
Information security
 

More from Mar Soriano (20)

Windows evolution
Windows evolutionWindows evolution
Windows evolution
 
FLYING CAR
FLYING CARFLYING CAR
FLYING CAR
 
Google’s Car
Google’s CarGoogle’s Car
Google’s Car
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Water mill
Water millWater mill
Water mill
 
Transformer1
Transformer1Transformer1
Transformer1
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatory
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Transformer1
Transformer1Transformer1
Transformer1
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphone
 
Jean
JeanJean
Jean
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Coming soon aug1
Coming soon aug1Coming soon aug1
Coming soon aug1
 
Space elevator sarah final
Space elevator sarah finalSpace elevator sarah final
Space elevator sarah final
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
A pc you can ride
A pc you can rideA pc you can ride
A pc you can ride
 
Robot teacher123final na
Robot teacher123final naRobot teacher123final na
Robot teacher123final na
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

Top 5 Omuter

  • 2.
  • 3. 5
  • 4. Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
  • 5. Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
  • 6. Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
  • 7.
  • 8. 4
  • 9. Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
  • 10. In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
  • 11.
  • 12. 3
  • 13. Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data. 
  • 14. Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
  • 15.
  • 16. 2
  • 17. Software Piracy Is one of the most common computer crimes. Copying software for distributing or personal use is considered an illegal act.
  • 18.
  • 19. 1
  • 20. Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
  • 21.
  • 22. “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim” 