nu’aim hussaini bin zulkefli 2011989743 sr221 csc434 pn noridah binti abu bakar

11
Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar * citize e-rule

Upload: leon-booker

Post on 01-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Nu’aim Hussaini Bin Zulkefli

2011989743

Sr221

Csc434

Pn Noridah Binti Abu Bakar

* citizene-rule

Page 2: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Understanding cyber crime

*Cyber crime is also known as computer crime,digital crime,e-crime and electronic crime.

*All indicated that the crimes are committed through the use of technology to intimidate people,commit fraud or steal valuable information.

Page 3: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Examples of cYBER crimes

*Internet banking fraud

*Harassment

*Intellectual property infringement

*Intrusion

*Offenses

Page 4: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Reasons for cyber crime*For persuit of fame and to gain reputation for intelligence or brilliance.

*Purely out of mischief.

*For financial means.

*To get revenge on someone they hate/dislike.

*To signal some form of protest.

*Purely to pursue criminal activities.

*To steal identify (identify theft).

*To forge documents and messages.

Page 5: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Effects of cyber crimeLoss of revenue/profits

It occurs when the company’s sensitive financial information is leaked or stolen and used by outside parties to illegally draw funds from its account.

Waste of valuable timeIT personnel will taste most of their valuable time to handle security breaches and other related problems caused by cyber crime.

Page 6: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Damaged reputationsCustomers will start to lose confidence in the ability of the company to take care of its security,thus the company’s reputation can be badly affected.

Reduced productivityBecause of the frequent occurrence of cyber crimes,many companies have begun to take measures in order to upgrade their security which includes requiring the employees to enter more passwords and security pins.As a result,employees are distracted from their work,resulting in decreases in productivity.

Page 7: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Property infrigements,legal rights

Software piracyFreeware and sharewareEULA

Page 8: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Software piracyPeople often share software they

bought.Many employees install the same programme on multiple computers using software for which only one license agreement was paid.These actions are against the law.

Page 9: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

Freeware and sharewareFreeware allows you to

download,copy,pass on or use software without payment for a license and you are allowed to utilize it for as long as you like.However,it is still considered as the intellectual property of the developer.

Page 10: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

End User License Agreement (EULA)

Is the license which comes with commercial software.It gives you the right to load or install the software on your computer legally,but you are prohibited from sharing and installing the software on other’s computers.

Page 11: Nu’aim Hussaini Bin Zulkefli 2011989743 Sr221 Csc434 Pn Noridah Binti Abu Bakar

THANKS FOR

WATCHING