By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

How to protect yourself, your computer, and others on the internet
Implications and Security Issues of the Internet By Neelesh Patel.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
By: Asfa Khan and Huda Mukhtar
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Technical Implementation: Security Risks
Lesson 10A: The Three D’s of Identify Theft
Digital Security Identity theft Copyright Laws Plagiarism, and More.
GCSE ICT SECURITY THREATS.
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime

Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.Internetcomputers Type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. hackingcopyright infringementchild pornographychild grooming There are two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. What are some of the crimes that cybercriminals do?

Example Of Crimes Examples of crimes that primarily target computer networks or devices would include: Examples of crimes that merely use computer networks or devices would include: Malware-is software designed to infiltrate a computer system without the owner's informed consent. Malwaresoftwareinformed consent Denial-of-service attack -is an attempt to make a computer resource unavailable to its intended users. Computer viruses - is a computer program that can copy itself and infect a computer. Computer viruses computer program Cyber stalking- is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyber stalking Internet stalk Fraud and identity theft-is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Fraudidentity theft fraud Information warfare -is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare Phishing scams -Is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details. Phishing scams passwords

FBI and Cyber Crime Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online sexual predators who use the Internet to meet and exploit children To counteract operations that target US intellectual property, endangering or national security and competitiveness To dismantle national and transnational organized criminal enterprises engaging in Internet fraud FBI’s cyber mission:

What is the FBI doing? Pose undercover as teenage girls in online chat rooms to try to catch internet predators. Trying to help internet scam victims and find who scammed them. Breaking passwords and decrypting files to find out what suspected hackers are doing

The US Immigration & Customs Enforcement Agency What are they involved in? Possession, manufacture and distribution of images of child abuse International money laundering and illegal cyber-banking Illegal arms trafficking and illegal export of strategic/controlled commodities Drug trafficking General smuggling (animals, stolen art etc) Intellectual property rights violations (sharing music) Immigration violations and identity and benefit fraud

How Can Cyber crime be Prevented Before giving out any personal info, ask how your information will be used and exactly how whoever is using it plans on protecting it and keeping it private Check your financial statements on a regular basis Check your bank statements at least once a month If you see anything you’re not sure of then you need to call your bank or credit card company immediately Do not store any personal, important information or your computer or laptop no matter what, it can be hacked and used against you in some form

How Can Cyber crime be Prevented Cont’d Cyber crime is extremely hard to prevent but there are a few easy ways to basically avoid it: Do not give out your address to unknown sources Do not open any mail or pop ups that you know nothing about Have a very strong anti virus and registry mechanic installed As crazy as it sounds, the best way to prevent Cyber crime is to use the internet as little as possible

How Do You Know If You Are a Cybercrime Victim There are unexplained charges or suspicious activity on one or more of your financial accounts Your computer is not acting the way it normally does You responded to an or website request for personal information You opened an attachment to an Your computer was lost or stolen Your child or yourself are being bullied or stalked in cyberspace Your child or you have encountered an Internet predator

How to Avoid Being a Victim of Cybercrime Have a good antivirus protection program in place, as well as a firewall. Protect your personal information, minimize the information that you put online. When shopping or banking online, always ensure that you are using secure sites. Password protect everything, do not use the obvious birth date, or mailing address, nothing simple to guess. Purchase a detailed report on how safe you are online. This report is called a risk assessment report and can give you a greater insight into how and where you are risking yourself online and how you can fix the problem. Never go to meet someone you've only met online unless you are with a group of people and are in a public place. Tell an adult that you are being bullied, contact officials.

What To Do If You Are a Victim CrimeOnline Fraud Parents should be proactive with children that are allowed Internet access. Block cyber bullies, most effective method of prevention. Adults and children should never give out any personal information that could be used for identification purposes If you suspect someone of being a sexual predator, you should report them immediately Children should be educated about Internet safety and Internet activity should be monitored as an added precaution. Close affected accounts immediately Set up a fraud alert with the 3 national consumer reporting agencies (Equifax, Experian, TransUnion) File a police report Contact government agencies Watch your credit reports closely Look for signs of identity theft

Avoiding Cybercrime Cybercrime