Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Identity: What to Know, What to Do.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Crime and Security in the Networked Economy Part 4.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Security, Privacy, and Ethics Online Computer Crimes.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Issues Raised by ICT.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Unethical use of Computers and Networks
CYBER CRIME.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
You. are at risk for the fastest growing crimes crime.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Identity Theft Project By: Timmy Townsend And Eric Fields.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Identity Theft It’s a crime!
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Protecting Your Identity:
Five Unethical Uses of Computers
Presentation transcript:

Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams

What is Computer Crime?  Using computer technology to maliciously affect others What’s At Risk: - Intellectual Property - Personal Information - Organizational Information - National and Global Security

Techniques  Scavenging: for stray data or garbage for clues that might unlock the secrets of a system  Zapping: which means penetrating a computer by unlocking the master key to its program and then destroying it by activating its own emergency program  Worms or worm programs: entail the deletion of portions of a computer's memory, thus creating a hole of missing information  Time bombs or Logic bombs: which involve the insertion of routines that can be triggered later by the computer's clock or a combination of events. When the bomb goes off, the entire system, perhaps worth millions, will crash  Viruses: are self-replicating programs which can have a similar effect to Time or Logic bombs

Forms Of Computer Crime Theft of Money -The transfer of payments to the wrong accounts Theft of Personal Information: - Stealing ones information through use of computer technology Theft of Goods - By their diversion to the wrong destination Theft of Computer Time: - Use of an employers computer resources for personal work

Who are the criminals?

What is Identity Theft?  The criminal act of using stolen information about a person to assume that person’s identity

History Through the creation of online databases, businesses, and online networks, in the past 20 years, it has become easier to commit identity theft through the use of computer crimes.

Ways to Commit Identity Theft Computer as a Tool: Hacking into databases: - Social Security Numbers - Credit Card Information - License Information

Ways to Commit Identity Theft Computer as an Object: Internet Fraud: - Applying for Credit Cards - Buying goods - Money Transfers

Ways to Prevent Identity Theft  Computer Protection - Passwords - Firewalls - Data Encryption  Personal Protection - Keep a watchful eye on bank accounts and credit statements

I am a Victim, What Should I do?  Close the accounts you know or you think may have been compromised  File a report with the state or local police  File a complaint with the FTC

Any Questions?