We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrett Lee
Modified about 1 year ago
© 2014 wheresjenny.com Cyber crime CYBER CRIME
© 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual appearance of the site or a webpage Cyber bullying : The use of electronic communication to bully a person, typically by sending messages of threatening nature Intellectual property : Intangible property that is the result of creativity, such as patents, copyrights, etc Malicious : Characterized by malice; intending or intended to do harm Breach : An act of breaking or failing to observe a law, agreement, or code of conduct Mitigating : Make (something bad) less severe, serious, or painful.
© 2014 wheresjenny.com Cyber crime What is Cyber Crime? Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime include identity theft, financial fraud, website defacement, and cyber bullying. At an organizational level, cyber crime may involve the hacking of customer databases and theft of intellectual property.
© 2014 wheresjenny.com Cyber crime An Example of Cyber Crime An example of one type of cyber crime is an "account takeover." This happens when cyber criminals compromise your computer and install malicious software, such as "key loggers" which record the key strokes, passwords, and other private information. This in turn allows them access the programs using your log-in credentials. Once these criminals steal your password, they may be able to breach your online bank account. These criminals can be anywhere in the world and may be able to transfer your money almost immediately.
© 2014 wheresjenny.com Cyber crime What is Crimeware? The software tools used in cybercrime is sometimes referred to as crimeware. Crimeware is software that is: used in the commission of the criminal act not generally regarded as a desirable software or hardware application not involuntarily enabling the crime
© 2014 wheresjenny.com Cyber crime Different types of Cyber Crime Hacking Online Identity Theft Denial-of-Service Attack Phishing Spamming and Bombing Web Jacking Data Diddling Software Piracy
© 2014 wheresjenny.com Cyber crime What are the Effects of Cyber Crime? The effects of a single, successful cyber attack can have far-reaching implications including financial losses, theft of intellectual property, and loss of consumer confidence and trust. The overall monetary impact of cyber crime on society and government is estimated to be billions of dollars a year. What Should We Do? Training and awareness are important first steps in mitigating these attacks. All citizens, consumers, and state employees should be aware of cyber threats and the actions they can take to protect their own information, as well as the information within their organization.
© 2014 wheresjenny.com Cyber crime How to minimize the risk of becoming a cybercrime victim? Use strong passwords Secure your computer: 1. Enable your firewall. 2. Use anti-virus/malware software. 3. Block spyware attacks. Secure your mobile devices. Install the latest operating system updates. Protect your data. Secure your wireless network Protect your e-identity Avoid being scammed.
© 2014 wheresjenny.com Cyber crime Quiz 1. Illegal Interception, Illegal Access, Data Interference, and System Interference are all a part of Cybercrime. A. True B. False 2. Computer hacking is the practice of modifying computer software and hardware to accomplish a goal outside of the creator's original purpose. A. Yes B. No 3. Identity Theft is not a growing problem in the United States. A. True B. False 4. Kids that have gone missing had the consent of their parents. A. Yes B. No 5. Spam is junk mail, sent indiscriminately for the purpose of selling goods or services and can also include punishing attempts and virus infections. A. True B. False
© 2014 wheresjenny.com Cyber crime 6. Cyberstalking can only be done online. A. Yes B. No 7. There is only one way to hack into someone's computer and their data. A. True B.False 8. Common cases of cybercrime include fraud, misuse of devices, hacking, identity theft, and cyberstalking. A. Yes B. No 9. When preventing your child to go missing, you have to know what social networks your child is in only. A. True B.False 10. Cyberstalking and harassment is most commonly done while on a computer, but it can also happen in real life. A. Yes B. No
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Nov. 2009Copyrighted Work--A. MAMBI,TCRA 1 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009 Presenter.
Securing Your Computer 1,2,3 The Basics Just the facts…….. In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Information technology security Fundamentals of Information Technology Session 8.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
Information Technology INT1001 Lecture 12 Privacy, Crime & Security 1.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Legal Issues in Information Security Chapter 5. Objectives Understand U.S. Criminal Law Understand U.S. Criminal Law Understand State Laws Understand.
Personal Privacy Identity protection in this wired world.
Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology.
Introduction to Network Security INFSCI 1075: Network Security Amir Masoumzadeh.
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
Copyright 2001 Brett J. Trout Security Concerns with e-Commerce Bretttrout.com.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
Computers Are Your Future Chapter 9: Privacy, Crime, and Security 1.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
1 UNIT 20 The ex-hacker. Introduction 2 A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers.
Let’s Talk About Cyber Security A guided PowerPoint lesson For Presentation at Mayfield Intermediate.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
ING Fraud Collection GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware,
Securing Information Systems The Challenge of the Digital Edge Management Information Systems Daniel Haryanto
Ethical and Social Issues in Information Systems DIS 302 E-Business.
© 2016 SlidePlayer.com Inc. All rights reserved.