We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMercy Marshall
Modified about 1 year ago
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 2 Chapter 3 Objectives Know the various types of Internet investment scams and auction frauds Know specific steps youcan take to avoid fraud on the Internet Have an understanding of what identity theft is and how it is done Know specific steps that can be taken to avoid identity theft
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 3 Chapter 3 Objectives- Cont. Understand what cyber stalking is, and be familiar with relevant laws Know how to configure a web browsers privacy settings Know what laws apply to these computer crimes
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 4 Internet Fraud Works Investment Scams Auction Frauds Shill bidding Bid shielding Bid siphoning Identity Theft Phishing Cross-Site Scripting
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 5 Cyber Stalking What is it? Real-world cases
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 6 Laws About Internet Fraud 18 U.S.C. 1028, also known as The Identity Theft and Assumption Deterrence Act of 1998 State laws against cyber stalking
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 7 Protecting Against Investment Fraud Only invest with well-known, reputable brokers. If it sounds too good to be true, then avoid it. Ask yourself why this person is informing you of this great investment deal. Why would a complete stranger decide to share some incredible investment opportunity with you? Remember that even legitimate investment involves risk, so never invest money that you cannot afford to lose.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 8 Protect Yourself Against Identity Theft Do not provide your personal information to anyone if it is not absolutely necessary. Destroy documents that have personal information on them. Check your credit frequently. If your state has online driving records, then check yours once per year.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 9 Secure Browser Settings Internet Explorer Firefox Chrome
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 10 Protect Yourself Against Auction Fraud Only use reputable auction sites. If it sounds too good to be true, don’t bid. Some sites actually allow you to read feedback other buyers have provided on a given seller. Read the feedback, and only work with reputable sellers. When possible use a separate credit card (one with a low limit) for online auctions.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 11 Protect Yourself Against Cyber Stalking If you use chat rooms, discussion boards, and so forth, do not use your real name. Set up a separate account with an anonymous service, such as Yahoo!, Gmail, or Hotmail. Then use that account and a fake name online. This makes it hard for an online stalker to trace back to you personally.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 12 Protect Yourself Against Cyber Stalking (cont.) If you are the victim of online harassment, keep all the s in both digital and printed format. Use some of the investigative techniques you explore later in this book to try toidentify the perpetrator. If you are successful, then you can take the s and the information on the perpetrator to law enforcement officials.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 13 Protect Yourself Against Cyber Stalking (cont.) Do not, in any case, ignore cyber stalking. According to the Working to Halt Online Abuse Web site,19 % of cyber stalking cases escalate to stalking in the real world.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 14 Summary Clearly, fraud and identity theft are real and growing problems. In this modern age of instant access to information and online purchasing, it is critical that everyone takes steps to protect themselves against this issue. Cyber stalking is one area that is often new to both civilians and law enforcement. Unfortunately, cyber stalking cases can escalate into real-world violence.
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
GPHS. Netsmartz.org National Center for Missing & Exploited Children Commonsensemedia.org Galena Park ISD Internet Safety Moodle Page.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
Avoid Identity Theft TCU Technology Resources Information Security Services.
Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi.
National Crime Prevention Council 2005 Identity Theft and Strategies for Crime Prevention.
COMPUTER NETWORKS. COMMUNICATION BETWEEN COMPUTERS For a computer to communicate with each other (which may be a completely different system) an interface.
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD.
Public Relation. While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
CYBER SECURITY October 2009 ARE YOU AWARE? The Federal Trade Commission reports that: For the seventh year in a row, identity theft tops the list, accounting.
Registration guide for Registration guide for :. Congratulations! Ready to register for MyAccountingLab ? Your Instructor has adopted MyAccountingLab.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Welcome to: Surfing Online Safely Brought to you by the MNPS Community Career Center.
Internet Safety and Dealing with Cyberbullies Barry Puryear.
INFORMATION AND RESOURCES Internet Safety. Internet Safety: The Issues Despite the educational and social benefits of information and communication technologies,
Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee
Cyber Safety Awareness Bahrain British Business Forum 21 February 2012 Ahmed J. Aldoseri Cyber Safety Director, TRA Bahrain ECSA, CEH, CEI, RHCI, RHCE,
Copyright © 2003 Pearson Education, Inc. Slide 10-1.
© 2016 SlidePlayer.com Inc. All rights reserved.