CYBER CRIME. WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Social media threats. Warning! May contain mild peril.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Internet Security Awareness Presenter: Royce Wilkerson.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Unethical use of Computers and Networks
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Crime & Malpractice AS Module Heathcote Ch. 10.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Get Safe Online Expert advice for everyone In association with.
Cybercrime What is it, what does it cost, & how is it regulated?
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
IT Security  .
Digital Citizenship Middle School
A Project on CYBER SECURITY
Information Systems for Health:
Protecting Your Company’s Most Valuable Asset
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

CYBER CRIME

WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones

SHAPES OF CYBER CRIMES cyberstalking fraud and identity theft Information walfare Phishing scams Harassment Threat Drug trafficking Cyber terrorism Obscene or offensive content

WHY CRIME CYBER COMMITTED??? For pursuit of fame and to gain reputation for intelligence or brilliance Purely out of mischief For financial means (money fraud) To get revenge on someone they hate To signal some form of protest Purely to pursue criminal activities To steal identity (identity theft) To forge documents and messages

EFFECTS OF CYBER CRIME LOSS OF PROFITS - occurs when the company’s sensitive financial information is leaked or stolen and used by outside parties to illegally draw funds from its account

REDUCED PRODUCTIVITY - Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity. This is because, due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do their jobs. Every second wasted performing these tasks is a second not spent working in a productive manner.

DAMAGED REPUTATIONS -customers will start to lose confidence in the ability of the company to take care of it security, thus the company’s reputation can be badly affected WASTE OF VALUABLE TIME - IT personal waste most of their valuable time to handle security breaches an other related problems caused by crime cyber

EXAMPLES OF CYBER CRIME FBI warns U.S. businesses of new Chinese cybercrime scheme By Terry Frieden, CNN Justice Producer | April 28, 2011 FBI agents combating international cybercrime are currently battling hackers on two new fronts -- from a remote corner of China to the virtual battlefields of "Call of Duty" emanating from the family playroom. On the international stage, FBI cybersleuths have informed U.S. businesses that millions of dollars have been fraudulently wired from business accounts in U.S. banks to banks in a remote coastal region of China near the Russian border. The FBI says apparently legitimately licensed Chinese economic and trade companies have successfully stolen at least $11 million dollars in a series of wire transfers to Heilongjiang province.

Study: Many UK businesses prey to cybercrime August 30, 2001 Cybercrime is on the rise in the UK and for the first time, those businesses that are hit by hacks are more likely to be attacked by hackers from outside of the company instead of inside, according to a study published Wednesday by the Confederation of British Industry (CBI). Of the 148 companies surveyed for the study "Cybercrime Survey 2001," two thirds have been the victim of a "serious" cybercrime in the past year, said CBI spokesman Roger Davidson. The CBI defined a serious cybercrime as a case of hacking of a company's computer system, a virus attack or credit card fraud.

Parents sue over Facebook photos of dead daughter By Jordana Ossad, CNN | March 29, 2011 The parents of a murder victim are suing Facebook after a paramedic pleaded guilty to photographing their daughter's corpse and posting the image to the social networking site, according to court documents. Caroline Wimmer, 26, was found by her parents, Ronald and Martha, after she was strangled with a hair-dryer cord in March 2009 in Staten Island, New York. Paramedic Mark Musarella -- who responded to their corresponding emergency call -- later pleaded guilty to disorderly conduct after posting to Facebook the photographs he took, the documents said.

WAYS TO PREVENT CYBER CRIME 1)Turn on your spam blocker 2) Make sure you have adequate anti-virus software for your computer 3) Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. 4) Encrypt important data you don't want compromised. 5) Be wary of providing personal information via a website you know nothing about 6) Make sure that you do online shopping on a secure website, like those with a URL that starts with "https" and/or have a trusted or VeriSign seal. 7)Monitor the online activities of your children.

REFERENCE cyber-crime.html _steps_to_protect_against_cybercrime_dell_en.pdf d/5 1citizen Student Quick Reference 1st Ed, Sept 2011, Prestariang Systems Sdn Bhd, Selangor, Malaysia.

THANK YOU