Philip Nichilo Vincent Carestia

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
CYBER CRIME AND SECURITY TRENDS
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT security By Tilly Gerlack.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 Introduction to Computing  Computer Programming  Terrorisom.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Internet safety By Suman Nazir
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Security and Ethics Safeguards and Codes of Conduct.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Management System Ali Saeed Khan 29 th April, 2016.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crime and security issues
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
A Project on CYBER SECURITY
Lecture 8. Cyber Security, Ethics and Trust
Homeland Security: Computer Protection
Network security threats
Challenges We Face On the Internet
Year 10 ICT ECDL/ICDL IT Security.
COMPUTER CRIME.
CSI Survey 2007 Tiffany Gorman
Online Banking Security
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
Prepared By : Binay Tiwari
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Forensic and Investigative Accounting
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
Technology Mrs. Huddleston
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Philip Nichilo Vincent Carestia Cyber Security Philip Nichilo Vincent Carestia

Most Common Types of Cyber Crime Identity Theft Intrusions Into Government Networks Cyber Stalking Computer Sabotage

Identity Theft Todays biggest cyber security concern is cyber identity theft. There are many ways to steal a persons identity online They include Hacking, the use of spyware and phishing Within the past 12 months, 9.3 million americans were victims of identity theft.

Hacking And Spyware Hacking is the illegal access by unknown and unauthorized parties to a computer system to destroy or disrupt the system or to use it to carry out illegal activities. More than 50 of reported data breaches in the last year have been attributed to computer hacking. Spyware is a type of malware that is installed on computers and collects information about users without their knowledge. 92 percent of surveyed computer users with spyware reported that they did not know of its presence on their computer.

Phishing This is a high tech scam that uses spam or pop-up messages to deceive consumers into disclosing their personal information concerning their back accounts , social security numbers or other crucial information. The average loss per phishing victim jumped from $257 in 2005 to $1,244 in 2006 Roughly 1 in 3 computer users have been a victim of phishing.

Intrusion of government networks Government computer networks are constantly bombarded with probes, viruses, worms and malware access attempts that originate both within network boundaries and from sources around the world. The Department of defense detected 300 million network penetration attempts last year.

Cyber Stalking Cyber stalking has been defined as the use of information on and communications technology, particularly the internet, by an individual to harass another individual or organization. More than 1,000,000 women and 370,000 men are stalked annually in the united states.

Computer sabotage Computer sabotage is the use of the internet to hinder the normal functioning of a computer system. This includes the use of worms, viruses, or logic bombs. Computer sabotage can be used to gain economic advantage over a competitor, to promote the illegal activities of terrorists, or to steal data programs for other illegal purposes

Prevention Methods Firewalls Frequent password changing Safe surfing Frequent virus checks Email filters