© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Unit 4 – Impact of the use of IT on Business Systems.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Unethical use of Computers and Networks
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
To Know what Cyber crime is
GCSE ICT SECURITY THREATS.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
COMPUTER CRIME.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

© 2014 wheresjenny.com Cyber crime CYBER CRIME

© 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual appearance of the site or a webpage Cyber bullying : The use of electronic communication to bully a person, typically by sending messages of threatening nature Intellectual property : Intangible property that is the result of creativity, such as patents, copyrights, etc Malicious : Characterized by malice; intending or intended to do harm Breach : An act of breaking or failing to observe a law, agreement, or code of conduct Mitigating : Make (something bad) less severe, serious, or painful.

© 2014 wheresjenny.com Cyber crime What is Cyber Crime? Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime include identity theft, financial fraud, website defacement, and cyber bullying. At an organizational level, cyber crime may involve the hacking of customer databases and theft of intellectual property.

© 2014 wheresjenny.com Cyber crime An Example of Cyber Crime An example of one type of cyber crime is an "account takeover." This happens when cyber criminals compromise your computer and install malicious software, such as "key loggers" which record the key strokes, passwords, and other private information. This in turn allows them access the programs using your log-in credentials. Once these criminals steal your password, they may be able to breach your online bank account. These criminals can be anywhere in the world and may be able to transfer your money almost immediately.

© 2014 wheresjenny.com Cyber crime What is Crimeware? The software tools used in cybercrime is sometimes referred to as crimeware. Crimeware is software that is: used in the commission of the criminal act not generally regarded as a desirable software or hardware application not involuntarily enabling the crime

© 2014 wheresjenny.com Cyber crime Different types of Cyber Crime Hacking Online Identity Theft Denial-of-Service Attack Phishing Spamming and Bombing Web Jacking Data Diddling Software Piracy

© 2014 wheresjenny.com Cyber crime What are the Effects of Cyber Crime? The effects of a single, successful cyber attack can have far-reaching implications including financial losses, theft of intellectual property, and loss of consumer confidence and trust. The overall monetary impact of cyber crime on society and government is estimated to be billions of dollars a year. What Should We Do? Training and awareness are important first steps in mitigating these attacks. All citizens, consumers, and state employees should be aware of cyber threats and the actions they can take to protect their own information, as well as the information within their organization.

© 2014 wheresjenny.com Cyber crime How to minimize the risk of becoming a cybercrime victim? Use strong passwords Secure your computer: 1. Enable your firewall. 2. Use anti-virus/malware software. 3. Block spyware attacks. Secure your mobile devices. Install the latest operating system updates. Protect your data. Secure your wireless network Protect your e-identity Avoid being scammed.

© 2014 wheresjenny.com Cyber crime Quiz 1. Illegal Interception, Illegal Access, Data Interference, and System Interference are all a part of Cybercrime. A. True B. False 2. Computer hacking is the practice of modifying computer software and hardware to accomplish a goal outside of the creator's original purpose. A. Yes B. No 3. Identity Theft is not a growing problem in the United States. A. True B. False 4. Kids that have gone missing had the consent of their parents. A. Yes B. No 5. Spam is junk mail, sent indiscriminately for the purpose of selling goods or services and can also include punishing attempts and virus infections. A. True B. False

© 2014 wheresjenny.com Cyber crime 6. Cyberstalking can only be done online. A. Yes B. No 7. There is only one way to hack into someone's computer and their data. A. True B.False 8. Common cases of cybercrime include fraud, misuse of devices, hacking, identity theft, and cyberstalking. A. Yes B. No 9. When preventing your child to go missing, you have to know what social networks your child is in only. A. True B.False 10. Cyberstalking and harassment is most commonly done while on a computer, but it can also happen in real life. A. Yes B. No