Please enable JavaScript.
Coggle requires JavaScript to display documents.
TOPIC 6 - COMPUTER CRIME - Coggle Diagram
TOPIC 6 - COMPUTER CRIME
computer crime: any crime that involves a computer and a network
crimes that primarily target computer networks or devices
malware
crimes that use computer networks or devices to advance other ends
hacking
to gain illegal or unauthorized access to a file, computer or network
fraud & identity theft
phishing scams
Identity theft and credit card fraud
identity theft: various crimes in which a criminal or large group uses the identity of an unknowing, innocent person
techniques used to steal personal and financial information
phishing
pharming
online resumes and job hunting sites
techniques used to protect personal and financial information
activation for new credit cards
retailers do not print the full card number and expiration date on receipts
responses to identity theft
authentication of email and websites
use of encryption to securely store data
authenticating customers
Scams and forgery
stock fraud
digital forgery
click fraud
analytical tools for cyber crime
fraud analytical tool
hacking analytical tool
fraud detection tools
hack detection tool
search and seizure of computers
requires a warrant to search and seize a computer
automated searches
issue of venue
the FBI usually files in the state where the crime was discovered and the investigation began
laws differ between states and ountries
charges are generally filed where the crime occurs
cybercrime treaty: to foster international cooperation among law agencies at different countries to fight cybercrime
emergence cyber law in Malaysia
What the Electronic Government is about?
Electronic Govt needs to be more central steeing
E-commerce will radically reshape govt over the next five years
Electronic Govt is already in many departments
Why the Electric Government exist?
there is strong belief in electronic govt
to control bloggers and prevent from spreading disharmony, chaos, seditious material and lies on websites
Govt is working on individual departmental projects rather than creating a general framework to take it forward
registering bloggers help prevent controversy in the govt and help promote harmony in the country
The Induce Act
Information Technology Act 2000
Digital Signature Act 1997
Communications & Multimedia Act (CMA) 1998
policy objectives
to promote consumer confidence in service delivery
to ensure equitable provision of affordable services
to regulate for the long-term benefit of the end user
to create a robust applications environment for the end user
Computer Crimes Act 1997
Telemedicine Act 1997
Copyright (Amendment) Act 1997