By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Presented By The Plano Police Department Crime Prevention Unit.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
By: Asfa Khan and Huda Mukhtar
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Presented By Plano Police Department Crime Prevention Unit.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Technical Implementation: Security Risks
Lesson 10A: The Three D’s of Identify Theft
Digital Security Identity theft Copyright Laws Plagiarism, and More.
GCSE ICT SECURITY THREATS.
Protecting Your Identity:
Emily Snyder, William Darras, Stephanie Berger
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime

Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.Internetcomputers Type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. hackingcopyright infringementchild pornographychild grooming There are two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. What are some of the crimes that cybercriminals do?

Example Of Crimes Examples of crimes that primarily target computer networks or devices would include: Examples of crimes that merely use computer networks or devices would include: Malware-is software designed to infiltrate a computer system without the owner's informed consent. Malwaresoftwareinformed consent Denial-of-service attack -is an attempt to make a computer resource unavailable to its intended users. Computer viruses - is a computer program that can copy itself and infect a computer. Computer viruses computer program Cyber stalking- is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyber stalking Internet stalk Fraud and identity theft-is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Fraudidentity theft fraud Information warfare -is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare Phishing scams -Is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details. Phishing scams passwords

FBI and Cyber Crime Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online sexual predators who use the Internet to meet and exploit children To counteract operations that target US intellectual property, endangering or national security and competitiveness To dismantle national and transnational organized criminal enterprises engaging in Internet fraud FBI’s cyber mission:

What is the FBI doing? Pose undercover as teenage girls in online chat rooms to try to catch internet predators. Trying to help internet scam victims and find who scammed them. Breaking passwords and decrypting files to find out what suspected hackers are doing

The US Immigration & Customs Enforcement Agency What are they involved in? Possession, manufacture and distribution of images of child abuse International money laundering and illegal cyber-banking Illegal arms trafficking and illegal export of strategic/controlled commodities Drug trafficking General smuggling (animals, stolen art etc) Intellectual property rights violations (sharing music) Immigration violations and identity and benefit fraud

How Do You Know If You Are a Cybercrime Victim There are unexplained charges or suspicious activity on one or more of your financial accounts Your computer is not acting the way it normally does You responded to an or website request for personal information You opened an attachment to an Your computer was lost or stolen Your child or yourself are being bullied or stalked in cyberspace Your child or you have encountered an Internet predator

How to Avoid Being a Victim of Cybercrime Have a good antivirus protection program in place, as well as a firewall. Protect your personal information, minimize the information that you put online. When shopping or banking online, always ensure that you are using secure sites. Password protect everything, do not use the obvious birth date, or mailing address, nothing simple to guess. Purchase a detailed report on how safe you are online. This report is called a risk assessment report and can give you a greater insight into how and where you are risking yourself online and how you can fix the problem. Never go to meet someone you've only met online unless you are with a group of people and are in a public place. Tell an adult that you are being bullied, contact officials.

What To Do If You Are a Victim CrimeOnline Fraud Parents should be proactive with children that are allowed Internet access. Block cyber bullies, most effective method of prevention. Adults and children should never give out any personal information that could be used for identification purposes If you suspect someone of being a sexual predator, you should report them immediately Children should be educated about Internet safety and Internet activity should be monitored as an added precaution. Close affected accounts immediately Set up a fraud alert with the 3 national consumer reporting agencies (Equifax, Experian, TransUnion) File a police report Contact government agencies Watch your credit reports closely Look for signs of identity theft

Avoiding Cybercrime Cybercrime