0% found this document useful (0 votes)
51 views14 pages

Lesson1a-Cybercrime Defintion

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views14 pages

Lesson1a-Cybercrime Defintion

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

defining

CYBERCRIME

cdKworks / 2020
Lesson 1a - learning objectives

At the end of this presentation, you should be


able to:
• define cybercrime in various perspectives; and
• name the various forms of cybercrimes
Take note …
• As cyberspace and Internet usage is growing,
the world is becoming smaller.
• The WWW is bringing the world closer making
it a smaller place to live in for its users.
• However, it brought problems for people who
spend long hours online.
CYBER PROBLEMS

• The number of cybercrimes is growing steadily.


• Many people have become victims of hacking,
online theft, identity theft, and malicious
software.
• Some even lost their ‘life’ because of offenses
such as cyberbullying, web-jacking and cyber-
terrorism.
definition of CYBERCRIME
definition of CYBERCRIME
Take note …
• CYBERCRIME is any illegal act committed using a
computer network (especially the Internet).

• CYBER refers to a computer network, the electronic


medium in which online communication takes place.

• CYBERCRIME is a subset of computer crime.

• A COMPUTER CRIME as a criminal act in which a


computer is used as the principal/main tool.
There are 3 ways …
• Computer or network can be a TOOL OF CRIME
(used to commit the crime)
• Computer or network can be a TARGET of the
crime (the “victim”)
• Computer or network can be used for
INCIDENTAL PURPOSES related to the crime
Legally speaking,
CYBERCRIME is a crime
committed with or thru the use of information and
communication technologies
such as radio, television, cellular phone,
computer and network,
and other communication device or application.
EXAMPLES of cybercrimes
Examples of Cybercrimes (continuation)
Types of CYBERCRIMES

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy