Presentation is loading. Please wait.

Presentation is loading. Please wait.

Yessenia Rico Amy Cahill Greta Leos Jacob Cordova.

Similar presentations


Presentation on theme: "Yessenia Rico Amy Cahill Greta Leos Jacob Cordova."— Presentation transcript:

1 Yessenia Rico Amy Cahill Greta Leos Jacob Cordova

2 Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware.

3 Popular Computer Crimes Identity Theft Spam Fraud Craig's List MySpace Pedophiles

4  Involves a person that is pretending to be someone else in order to steal information, money, or anything that they could want from that individual  Statistics  2007-446 data breach incidents  2008 First 9 months-516 data breach incidents  80% of these incidents are related to or involve digital records  Two-thirds of identity theft begins with email solicitations

5  Spamming is the sending of unsolicitated electronic messages  Most spam mail originates from advertisers looking to push their products further  Spamming contributes to other problems also  Identity theft  Viruses

6  Myspace is a computer crime because you can give false identity. Myspace can also generates controversy ranging from rape and murder to child predators and drug dealers.  Myspace is positive in ways as in you can chat with family, Friends who have move away.

7 As a medical diagnosis, it is defined as a psychological disorder in which an adult or older adolescent experiences a sexual preference for prepubescent children. The Internet Allows Pedophiles: Instant access to other predators worldwide; Open discussion of their sexual desires; Shared ideas about ways to lure victims; Mutual support of their adult-child sex philosophies; Instant access to potential child victims worldwide; Disguised identities for approaching children, even to the point of presenting as a member of teen groups; Ready access to "teen chat rooms" to find out how and who to target as potential victims; Means to identify and track down home contact information; Ability to build a long-term "Internet" relationship with a potential victim, prior to attempting to engage the child in physical contact.

8  Passwords Select a GOOD password, try to mix up a combination of characters in a password of only 1,2,3, or 4 characters. Avoid obvious passwords…example (your name, date of birth, and your nickname).  Personal Information Don’t give out banking account information unless you know it’s a secured site!! Never give out your Social Security Number. Make sure to logout of everything after your done using your computer, that way if someone else uses it they can’t get a hold of your personal info.

9  Anti-Virus Protection Don’t bring disks in from outside sources. Scan demo disks and downloaded files for viruses.

10 There is an unfortunate percent that will be victims but you can prevent it from happening by being aware of your actions on the internet.

11 http://en.wikipedia.org/wiki/Pedophilia http://www.mental-health- matters.com/index.php?option=com_cont ent&view=article&id=519 http://crime.about.com/od/sex/p/pedop hile.htm http://www.csbsju.edu/uspp/CrimPsych /CPSG-6.htm http://www.totalbankruptcy.com/


Download ppt "Yessenia Rico Amy Cahill Greta Leos Jacob Cordova."

Similar presentations


Ads by Google