SlideShare a Scribd company logo
High tech (cyber) crimesElizabeth HallKaplan UniversityCJ216-07Erik Bernholdt5.18.10
Types of Cyber CrimesCyber Vandalism/Computer CrimesTechnology CrimesCyber Theft/Computer Related CrimesCyber Warfare(Siegel, 2010)(Foster, 2000)
Cyber VandalismComputer Crime in which the computer or the performance of the computer is attacked  Carried out through the computer for malevolent intent,  vengeance, or damage(Siegel, 2010)(Foster, 2000)
Types of Cyber VandalismWorms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers.   Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers,  remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information(Siegel, 2010)(Foster, 2000)
Types of Cyber Vandalism 2Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc.    Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openlyThis crime generally means malicious or harmful actions directed at computers or persons via internet(Siegel, 2010)(Foster, 2000)
Technology CrimesTechnology used in crime commission other than computers themselves- includes softwareThese crimes often affect the elderly through phone scams promising large cash prizes  after giving up personal information such as bank account numbers, or social security numbers.(Siegel, 2010)(Foster, 2000)
Types of Technology CrimesCell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet(Siegel, 2010)(Foster, 2000)
Types of Technology Crimes Shoplifting SoftwarePhysically stealing hardware for resale or information Theft of cable services(Siegel, 2010)(Foster, 2000)
Types of Technology Crimes 2Duplicating Software Selling duplicated software via internet or otherwiseThis crime generally means using technology other than computers in commission of crime(Siegel, 2010)(Foster, 2000)
Cyber TheftUse of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returnsThese crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous.(Siegel, 2010)(Foster, 2000)
Types of cyber theft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionageUnlawful distribution of pornography or drugs for profitDenial of Services Attack- used to annoy or extract money from web users by preventing access to service (Siegel, 2010)(Foster, 2000)
Types of cyber theft 2 Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharingInternet securities fraudIdentity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information(Siegel, 2010)(Foster, 2000)
Types of cyber theft 3 Phishing- duplicating legitimate websites in order to obtain personal information E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds(Siegel, 2010)(Foster, 2000)
Cyber WarfareCyber crime in which perpetrators have political motives attachedThese crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information(Siegel, 2010)(Foster, 2000)
Types of Cyber Warfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services(Siegel, 2010)(Foster, 2000)
Controlling CybercrimeThe growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes.This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training(Siegel, 2010)(Foster, 2000)
Controlling Cybercrime 2Some of these challenges include: Global nature of cybercrimeHigh tech crimes are often misclassified causing Statistical information to be skewedAllocation of funds usually favors traditionalcrimes because of skewed statisticsPlenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR (Siegel, 2010)(Foster, 2000)
ReferencesFoster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice HallSiegel, L.J. (2010).  Criminology: Theories, Patterns, and Typologies.  Tenth Edition.  Belmont:                  Wadsworth Cengage Learning.

More Related Content

PPTX
It act and cyber crime
PPTX
Cyber Crime
PPTX
Cyber crime &_info_security
PPT
Cyber crime & security final tapan
PPTX
CYBER CRIME( DU PRESENTATION FOR FYUP)
PPT
CYBER CRIME
PPTX
Final cyber crime and security
PPT
Cyber Crime
It act and cyber crime
Cyber Crime
Cyber crime &_info_security
Cyber crime & security final tapan
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME
Final cyber crime and security
Cyber Crime

What's hot (20)

PPTX
cyber crime
PPTX
PPT
Cyber Crime and Security
PPTX
Cyber crime.pptx
PPTX
Cyber crime ✔
PPTX
CyberCrimes
PPTX
Cyber crime ppt
PPSX
Cyber crime
PPTX
Cyber crime and cyber laws
PPT
SITA LAB PPT (XYBER CRIME)
PPTX
Asis Verma cyber crime ppt
PPT
cyber crime
PPTX
Cybercrime a growing threat of 21 st century !!!
PPTX
Introduction to cybercrime
PPTX
Cyber Crime PPT
PPTX
PPTX
Cyber Crime and Security
PPTX
Cyber crime - What is and types.
PPTX
Cyber Crime
PPTX
Cybercrime
cyber crime
Cyber Crime and Security
Cyber crime.pptx
Cyber crime ✔
CyberCrimes
Cyber crime ppt
Cyber crime
Cyber crime and cyber laws
SITA LAB PPT (XYBER CRIME)
Asis Verma cyber crime ppt
cyber crime
Cybercrime a growing threat of 21 st century !!!
Introduction to cybercrime
Cyber Crime PPT
Cyber Crime and Security
Cyber crime - What is and types.
Cyber Crime
Cybercrime

Viewers also liked (10)

DOCX
Unit2 project elizbeth hall
DOCX
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
PPTX
Crimes & punishments
PPTX
CAPITAL PUNISHMENT
PPTX
Types of Crime
PPT
Crime and its types
PPT
Criminal law.power point....
PPTX
Terrorism-Causes and Types
PDF
Ppt jobs and occupations
PPTX
CRIMINOLOGY: An Introduction and Overview
Unit2 project elizbeth hall
Hall del elizabeth del proyecto de la unidad 9 que determina la traducción es...
Crimes & punishments
CAPITAL PUNISHMENT
Types of Crime
Crime and its types
Criminal law.power point....
Terrorism-Causes and Types
Ppt jobs and occupations
CRIMINOLOGY: An Introduction and Overview

Similar to High Tech (Cyber) Crimes (20)

PPTX
High tech (cyber) crimes
PPTX
CYBER CRIME sujal education it related ppt. Pptx
DOCX
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
PPT
Citi NCR-Gurgaon 2010 -Presentation2.ppt
PPTX
Cyber-crime and cyber security PPT.pptx
PPTX
Cyber crime
PPTX
Cyber crime
PPT
unit 1. introduction to cyber crime.ppt
PPTX
Cyber crime
PDF
NS UNIT 3 COMBINED.pdf
PPTX
Cybercrime
PPTX
Cybercrime
PDF
A Review Paper On Cyber Crime
PPT
Introduction to CYBER-CRIME PRESENTATION.ppt
PPTX
Cyber Crimes.pptx
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PDF
Iaetsd cyber crimeand
PPTX
Cyber crime
PPTX
Internet
DOC
English in written
High tech (cyber) crimes
CYBER CRIME sujal education it related ppt. Pptx
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
Citi NCR-Gurgaon 2010 -Presentation2.ppt
Cyber-crime and cyber security PPT.pptx
Cyber crime
Cyber crime
unit 1. introduction to cyber crime.ppt
Cyber crime
NS UNIT 3 COMBINED.pdf
Cybercrime
Cybercrime
A Review Paper On Cyber Crime
Introduction to CYBER-CRIME PRESENTATION.ppt
Cyber Crimes.pptx
First Lecture- Cyber Security-Bangladesh.pptx
Iaetsd cyber crimeand
Cyber crime
Internet
English in written

More from Elizabeth Hall (20)

DOCX
Unit 9 project elizabeth hall assessing competency
DOCX
Unit 8 project elizabeth hall psychology jury selection
DOCX
Unit 5 project elizabeth hall psychological roles
DOCX
Unit 7 project elizabeth hall civil committment and insanity defense
DOCX
Unit 7 project 9 11 attacks
DOCX
Unit 8 project identifying crime patterns e hall
DOCX
Unit 9 project elizbeth hall
DOCX
Unit 5 project elizbeth hall
DOCX
Unit 7 assignment elizabeth hall
DOCX
Unit 6 assignment elizabeth hall
DOCX
Unit 5 assignment elizabeth hall
DOCX
Unit 2 assignment elizabeth hall
DOCX
Unit 9 assignment elizabeth hall
DOCX
Hall elizabeth unit nine project
DOCX
Police Information Acces
DOCX
Hall Elizabeth Seminar 7 Makeup Paper
DOCX
Unit 5 Project
PPTX
The Evolution Of Politicical Violence And Terrorism
DOCX
Unit 5 Project
DOCX
The Greatest Threat To Society
Unit 9 project elizabeth hall assessing competency
Unit 8 project elizabeth hall psychology jury selection
Unit 5 project elizabeth hall psychological roles
Unit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project 9 11 attacks
Unit 8 project identifying crime patterns e hall
Unit 9 project elizbeth hall
Unit 5 project elizbeth hall
Unit 7 assignment elizabeth hall
Unit 6 assignment elizabeth hall
Unit 5 assignment elizabeth hall
Unit 2 assignment elizabeth hall
Unit 9 assignment elizabeth hall
Hall elizabeth unit nine project
Police Information Acces
Hall Elizabeth Seminar 7 Makeup Paper
Unit 5 Project
The Evolution Of Politicical Violence And Terrorism
Unit 5 Project
The Greatest Threat To Society

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation theory and applications.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

High Tech (Cyber) Crimes

  • 1. High tech (cyber) crimesElizabeth HallKaplan UniversityCJ216-07Erik Bernholdt5.18.10
  • 2. Types of Cyber CrimesCyber Vandalism/Computer CrimesTechnology CrimesCyber Theft/Computer Related CrimesCyber Warfare(Siegel, 2010)(Foster, 2000)
  • 3. Cyber VandalismComputer Crime in which the computer or the performance of the computer is attacked Carried out through the computer for malevolent intent, vengeance, or damage(Siegel, 2010)(Foster, 2000)
  • 4. Types of Cyber VandalismWorms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information(Siegel, 2010)(Foster, 2000)
  • 5. Types of Cyber Vandalism 2Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc. Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openlyThis crime generally means malicious or harmful actions directed at computers or persons via internet(Siegel, 2010)(Foster, 2000)
  • 6. Technology CrimesTechnology used in crime commission other than computers themselves- includes softwareThese crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers.(Siegel, 2010)(Foster, 2000)
  • 7. Types of Technology CrimesCell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet(Siegel, 2010)(Foster, 2000)
  • 8. Types of Technology Crimes Shoplifting SoftwarePhysically stealing hardware for resale or information Theft of cable services(Siegel, 2010)(Foster, 2000)
  • 9. Types of Technology Crimes 2Duplicating Software Selling duplicated software via internet or otherwiseThis crime generally means using technology other than computers in commission of crime(Siegel, 2010)(Foster, 2000)
  • 10. Cyber TheftUse of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returnsThese crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous.(Siegel, 2010)(Foster, 2000)
  • 11. Types of cyber theft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionageUnlawful distribution of pornography or drugs for profitDenial of Services Attack- used to annoy or extract money from web users by preventing access to service (Siegel, 2010)(Foster, 2000)
  • 12. Types of cyber theft 2 Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharingInternet securities fraudIdentity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information(Siegel, 2010)(Foster, 2000)
  • 13. Types of cyber theft 3 Phishing- duplicating legitimate websites in order to obtain personal information E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds(Siegel, 2010)(Foster, 2000)
  • 14. Cyber WarfareCyber crime in which perpetrators have political motives attachedThese crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information(Siegel, 2010)(Foster, 2000)
  • 15. Types of Cyber Warfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services(Siegel, 2010)(Foster, 2000)
  • 16. Controlling CybercrimeThe growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes.This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training(Siegel, 2010)(Foster, 2000)
  • 17. Controlling Cybercrime 2Some of these challenges include: Global nature of cybercrimeHigh tech crimes are often misclassified causing Statistical information to be skewedAllocation of funds usually favors traditionalcrimes because of skewed statisticsPlenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR (Siegel, 2010)(Foster, 2000)
  • 18. ReferencesFoster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice HallSiegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. Belmont: Wadsworth Cengage Learning.