By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Internet Safety Prevents ID Theft Business Law II Chapter 33.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Internet Security Awareness Presenter: Royce Wilkerson.
Chapter 5 Identity Theft and related topics. Synopsis What is identity theft? What is phishing? How does phishing work? What is pharming? Whose identity.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Protecting Our Personal Space Security in a Virtual World.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet safety By Lydia Snowden.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Fraud Examination, 3E Chapter 15: Consumer Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Identity Theft.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Get Safe Online Expert advice for everyone In association with.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Advanced Academic Reading and Discussion Attendance Please raise your hand and say “HERE!”
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Be Computer Smart Internet Safety Kathy Pascavage.
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
By: Micah Stevens Identity Theft in the World Today.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Computer Security Fundamentals
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
A Project on CYBER SECURITY
Cyber Security Awareness Workshop
cybercrime Presented to you by : NAMES MATRIC NO
Protect Your Computer Against Harmful Attacks!
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

By: Arjun Vachhani

 What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics  FBI Cybercrime Unit  FBI Cybercrime Safety

 What is Cybercrime?  What is the Law against Cybercrime?  Computer Fraud and Abuse Act  Identity Theft Enforcement and Restitution Act

 Cybercrime is a social norm.  Types of cybercrime  Bank fraud/ Identity Theft  Pirating or Copyright  Phishing Scams

 Albert Gonzalez was caught stealing approximately 130 million credit/debit card numbers.  20 years, the harshest punishment for a computer crime.

 What is a phishing scam?  Sites ask for login information  100 phishers charged in cybercrime case.  53 from the U.S. and 47 overseas  F.B.I. say thousands of victims are “used” for bank fraud each year.

 Norton Cyber Crime Report for 2011  431 million victims  114 billion dollars  Second Annual Cost of Cyber Crime Study, Poneman Institute  Median increased by 56%  $6 million per year  Based on 50 U.S. businesses

 Checks records  Constant credit check  Investment check

 Safety Recommendations  Keep your Firewall turned on  Install Antivirus software  Install Antispyware  Keep system up to date  Careful Download  Turn your computer off

computer-history/ statistics_b_ html