CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Northside I.S.D. Acceptable Use Policy
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Important Facts you should know about the Net
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Related Issue
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
 Spam, or the unsolicited sending of bulk for commercial purposes, is unlawful in some jurisdictions. While anti- spam laws are relatively new,
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Cyber Crimes.
CYBER CRIME. WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
INTERNET SAFETY. There are basically two dangers associated with visiting WEB SITES! You may come across material that is sexual, hateful, violent, or.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright.
Jeopardy Chatting with strangers Spam and other viruses Security and Privacy Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CYBER CRIME.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What is Internet? - Is a worldwide collection of computers networks, cooperating with each other to exchange data using a common software standard, on.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Ethics. Ethics are the principles and standards we use to decide how to act.
Use of information technology in the educational system in Bulgaria State policy of implementing security and safety measures of pupils in network.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Netcrime refers, more precisely, to criminal exploitation of.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Security Issues & Ethics in Education By Maud Mushayamunda.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
The Disadvantages of ICT
Misuses of ICT Malpractice and crime © Folens 2008.
COMPUTER CRIME.
Follow safety rules so that YOU: Avoid getting HURT.
Presentation transcript:

CYBER CRIME

is a CRIMINAL activity done using COMPUTERS and INTERNET

Cyber crime basically are committed against individuals or groups of individuals with a CRIMINAL MOTIVE to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly by using modern telecommunication networks such as Internet and mobile phones

T YPES OF CYBER CRIME  Spam  Fraud  Harassment  Obscene and Offensive Content  Drug Trafficking  Cyber Terrorism

unsolicited sending out of junk s for commercial purposes, which is unlawful refer to fallacious misrepresentation of fact conveyed with intention of inducing another to do or refrain from doing something that will ultimately lead to some major kind of loss SPAMFRAUD

Commonly encountered in chat rooms or through newsgroups sending someone else inappropriate photos, sexually explicit materials or racist propaganda HARASSMENT OBSCENE & OFFENSIVE CONTENT

drug traffickers usually used Internet in trading their illegal substances such as drug by sending enciphered s through chat rooms hacking into official websites or crashing of official websites DRUG TRAFFICKINGCYBER TERRORISM

EFFECTS OF CYBER CRIME Loss of Profits Waste of Valuable Time Damaged Reputations Reduced Productivity

CYBER CRIME PREVENTION TURN ON SPAM BLOCKER - to prevent unwanted s such as phising s to inbox Use adequate anti-virus software or update anti- virus regularly Used computer’s firewall protection feature to prevent hackers from hacking the computer system Encrypt important data

CYBER CRIME PREVENTION cont…. Do not easily give personal information through chat rooms or entrusted websites Always do online shopping on a secure websites - url that begin with “https” and have lock sign Avoid from joining common scam such as foreign scam or gambling Always monitor children’s online activities. Use parental control software that limit the types of sites the user can gain to access to

CYBER CRIME STATISTIC

O NLINE SCAM

I DENTITY THEFT

FRAUD

HARASSMENT

OBSCENE & OFFENSIVE CONTENT

DRUG TRAFFICKING

CYBER TERRORISM

CONCLUSIONCONCLUSION Cyber crime can cause so much trouble to Netizen so We should not get involve in any kind of this crime We should not be cyber crime offenders nor victims

REFERENCES crime.html cyber-crime.html cyber-crime.html

T HE END