The Disadvantages of ICT

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Breaking Trust On The Internet
INTERNET SAFETY.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Cyber Crime Mid Regional Police Hetauda & Regualtion in Nepal
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Cyber X-Force-SMS alert system for threats.
Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
General Purpose Packages
Cyber Crimes.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Unethical use of Computers and Networks
CYBER CRIME.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Security Issues & Ethics in Education By Maud Mushayamunda.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
Security, Social and Legal Issues Regarding Software and Internet
To Know what Cyber crime is
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 5 Electronic Commerce | Security
cybercrime Presented to you by : NAMES MATRIC NO
Topic 6: Issues Press F5 to view!
Five Unethical Uses of Computers
Risk of the Internet At Home
Chapter 5 Electronic Commerce | Security
Societal Issues in Computing (COMP466)
What is Computer Crime? Identity Theft Cyber-Bulling Hacking
– Communication Technology in a Changing World
Top Five Computer Related Crimes
Ethics & Privacy CSCI 101.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Entering the World of Cybercrime
Privacy, Security, and Ethics
Laws Against Computer Hacking
Presentation transcript:

The Disadvantages of ICT Lesson 15 The Disadvantages of ICT • Cybercrimes • Combatting cybercrimes

At the end of this lesson, the students should be able to: 1. understand the several problems ICT has created in their generation; and 2. write a reflective essay on how ICT can change the world for better or for worse.

Cybercrimes Cybercrimes are illegal acts done through the use of the Internet. Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime. Ask the students what actions were done to take down their issue (in re: 1st item).

In 2012, Stephen Nale (Complex In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows: 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet.

3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people.

7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. 8. Drug Trafficking – the act of selling illegal substances using the Internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.

Combatting Cybercrimes 1. Network Security. Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment. Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.