Académique Documents
Professionnel Documents
Culture Documents
HISTORY
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom.
This device allowed the repetition of a series of
steps in the weaving of special fabrics.
This resulted in a fear amongst Jacquard's
employees that their traditional employment
and livelihood were being threatened.
They committed acts of sabotage to discourage
Jacquard from further use of the new
technology. This is the first recorded cyber
IMPACT
Loss of revenue
Wasted time
Damaged reputations
Reduced productivity
COMPUTER AS A TOOL
When the individual is the main
target of the crime the computer
can be considered as a tool
rather than target.
These crimes are not done by
technical experts.
Example: Spam, cyber stalking,
cyber theft etc.
COMPUTER AS A TARGET
These crimes are committed
by a selected group of people
with technical knowledge.
Destruction of information in
the computer by spreading
virus.
Example: Defacement, cyber
terrorism etc.
Hacking
DOS
Virus dissemination
Data diddling
Cyber terrorism
Software piracy
Cyber squatting
Phishing
GOOGLE-CHINA: 2009
Hackers accessed corporates
servers.
Stole intellectual property.
Further investigation revealed
hacking of Gmail on regular
basis.
Reason being weakness in
Internet Explorer.
MAFIABOY: 2000
15 year old boy Michael Calce.
Launched DDOS attack on
Amazon, eBay, CNN & Yahoo.
Caused $1.2 billion damage.