colegio de dagupancyber-crime detector nowadays, cyber crime is ranging to catastrophic. and...

Upload: janella-de-guzman-tomelden

Post on 14-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 Colegio de DagupanCyber-Crime Detector Nowadays, cyber crime is ranging to catastrophic. And thats why I ma

    1/2

    COLEGIO de DAGUPAN

    Jamaila D. Tomelden

    QLTY CONCIOUSNESS, HABITS &PROCESS

    Cyber-Crime Detector

    Nowadays, cyber crime is ranging to catastrophic. And thats why I made this to catch those

    cyber criminals, cracker, and distributors of viruses. Etc. People can make those crimes

    unintentionally. For example, In a computer, a virus is a program which modifies other

    programs so they replicate the virus. In other words, the healthy living cell becomes the original

    program, and the virus affects the way the program operates. How? It inserts a copy of itself in

    the code. Thus, when the program runs, it makes a copy of the virus. This happens only on a

    single system. However, if a virus infects a program which is copied to a disk and transferred to

    another computer, it could also infect programs on that computer. This is how a computer virusspreads.

    To catch those criminals who threat people to danger. I made this in order to prevent from spreading virus. People who are well-trained are the one who can use this. To catch those hackers. People leave a lot of information about themselves online. Such information can leave

    you vulnerable to cyber stalking, a term that essentially refers to using the Internet to

    stalk someone in the traditional sense. This one is made for to find those people who

    are trying to steal identity of one another.

    Drug addicts are selling illegal drugs trough internet and that why this one made for.Drug traffickers are increasingly taking advantage of the internet to sell their illegal

    substances through encrypted e-mailand other Internet Technology. Some drug

    traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages

    of pills, and swap recipes for amphetamines in restricted-access chat rooms.

    The rise in Internet drug trades could also be attributed to the lack of face-to-face

    communication. These virtual exchanges allow more intimidated individuals to more

    comfortably purchase illegal drugs. The sketchy effects that are often associated with

    drug trades are severely minimized and the filtering process that comes with physical

    interaction fades away.

    Child pornography. This is made to exploit those children. Cyber terrorism can be defined as an act of terrorism trough computers. To catch those internet stalkers. This was made to prevent internet war.

    http://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Drug_traffickerhttp://en.wikipedia.org/wiki/Drug_traffickerhttp://en.wikipedia.org/wiki/Internet_cafehttp://en.wikipedia.org/wiki/Internet_cafehttp://en.wikipedia.org/wiki/Drug_traffickerhttp://en.wikipedia.org/wiki/Drug_traffickerhttp://en.wikipedia.org/wiki/E-mail
  • 7/27/2019 Colegio de DagupanCyber-Crime Detector Nowadays, cyber crime is ranging to catastrophic. And thats why I ma

    2/2

    Cyber bullying is the use of the Internet to harass other people.A particularly nasty kind of personnel breach we've seen lately is harassment on the

    Internet. Sending threatening email messages and slandering people on bulletin board

    systems and newsgroups is all too common. In a recent harassment case, a student from

    the University of Michigan was indicted for posting a particularly graphic story about a

    sex murder on an Internet newsgroup. Because he used the name of an actual femalestudent at Michigan, his activities were initially considered to be harassment.

    These kinds of attacks are not new, and personally threatening remarks can as easily be

    sent by letter or posted on a wall, as they can be sent over the Internet. But the

    electronic audience is a much larger one, and such messages, sent out from an

    organization's network domain, may damage the reputation of the organization as well

    as that of the particular perpetrator.

    To catch those computer trespasses. To prevent internet suicide.