Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

How to protect yourself, your computer, and others on the internet
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Primary Threats to Computer Security
 Network Hacking Unit 3 Presentation. Introduction to hacking  Definition of a Hacker: “A person who illegally gains access to and sometimes tampers.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
INTERNET SAFETY FOR STUDENTS
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
INTERNET SAFETY FOR STUDENTS
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Unit 4 – Impact of the use of IT on Business Systems.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
Unethical use of Computers and Networks
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology: Friend or Foe? Thinking about Information Ethics.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
To Know what Cyber crime is
IT Security  .
Digital Citizenship Middle School
Cyber crime and security issues
How to build a good reputation online
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Year 10 ICT ECDL/ICDL IT Security.
Assalamualaikum Today, I am going to give a presentation on
Five Unethical Uses of Computers
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Cybercrime Justine Brown COSC 101

What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the internet. Department of Justice explains three ways computers are used for cybercrime: Department of Justice explains three ways computers are used for cybercrime: – The target – The weapon – The accessory Many different types of cybercrimes Many different types of cybercrimes Social Networks are used in the crimes Social Networks are used in the crimes Ways to protect yourself and your computer Ways to protect yourself and your computer

“ The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”---National Research Council, “Computers at Risk”, 1991

Three Major Categories of Cybercrime: Three Major Categories of Cybercrime: 1.Cybercrimes against a person 2.Cybercrimes against property 3.Cybercrimes against the government

Cybercrimes against a person Trafficking of obscene material Cyberharassment Violation of privacy of online citizens Identity theft – Phishing and pharming Cyberbullying

All forms of property Computer vandalism Transmission of harmful programs Theft of material on a computer Cybercrime against property

Cybercrime against the government Cyberterrorism Cyberterrorism – When someone “cracks” into a government maintained website – Terrorizing citizens and group of people using cyberspace

Other Cybercrimes Downloading of illegal music files Downloading of illegal music files Spam Spam Auction fraud Auction fraud Non-deliverance of merchandise Non-deliverance of merchandise Credit card fraud Credit card fraud

Social Networks and Cybercriminals Spammers taking advantage of social networks Spammers taking advantage of social networks Vehicles to distribute malicious programs Vehicles to distribute malicious programs Not easily blocked Not easily blocked Stolen credentials of Facebook can sell for $75- $200 Stolen credentials of Facebook can sell for $75- $200 Can abstract addresses, contact lists, birthdates, hometowns, photos Can abstract addresses, contact lists, birthdates, hometowns, photos Facebook creating recent partnerships with Microsoft and Mcfee Facebook creating recent partnerships with Microsoft and Mcfee

How to protect yourself from Cybercrime Get educated on Internet crimes Get educated on Internet crimes Use caution with passwords Use caution with passwords Protect your computer using firewalls and virus protection Protect your computer using firewalls and virus protection Use common sense! Use common sense!

Conclusion Cybercrime is a growing problem Cybercrime is a growing problem It comes in many forms It comes in many forms Ways to try and prevent Cybercrime Ways to try and prevent Cybercrime

Any Questions?

Bibliography Babu, Maya. "What Is Cybercrime?" Computer Crime Research Center - Daily News about Computer Crime, Internet Fraud and Cyber Terrorism. Web. 29 Nov Byron, Acohido. "How Cybercriminals Invade Social Networks, Companies." USA.com. 4 Mar Web. 29 Nov "Cybercrime Definition." The Tech Terms Computer Dictionary. Web. 29 Nov Girl, 13, Commits Suicide after Being Cyber-bullied by Neighbour Posing as Teenage Boy | Mail Online." Home | Mail Online. Web. 29 Nov "What Is Cyber Crime?" Cyber Citizen. Web. 29 Nov