CYBERCRIME: Fighting Electronic Crime on the Internet.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Internet Safety Keeping Our Kids Safe Online. How do you use the Internet? News Shopping Banking File Sharing Downloading Music YouTube Chat Instant.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
How to protect yourself, your computer, and others on the internet
Cyber Safety Assessment Review
 Familiarize yourself with the Internet  Utilize site/content blocking software and/or parental controls  Randomly check your child’s and Internet.
Internet Safety Tips for Parents.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
How to keep your kids safe online
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
STRATEGIES. Non-Technical Measures to Protect Kids Online.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
STAYING SAFE ON THE INTERNET Common Sense Information.
Company LOGO Internet Safety A Community Approach.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Issues for Computer Users, Electronic Devices, Computer and Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
A Parent’s Guide to Child Safety on the Internet.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
Seminar On Cyber Crime Submitted To: Submitted By:
Internet Safety Tips for Parents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

CYBERCRIME: Fighting Electronic Crime on the Internet

The Internet is a Tool –Common uses: The Web (WWW) Instant Messenger (IM) File Sharing (P2P, ) Streaming Media (Audio, Video) Communications ( , Voice over IP – Internet Phone) Ecommerce (Shopping, Banking, Investing) Computers are Tools –assist us in our work, calendars, finances, research, communications –Providing recreation and entertainment Computers Are Used to Commit Cyber Crimes –Data can be stolen, altered, hidden or warped –Communication can be hidden, altered or recorded –Preventing, detecting, and prosecuting computer crime is one of the most significant challenges to Law Enforcement in modern dayIntroduction

Impact of High-Technology on Your Safety   Greater & more enduring than drugs  greater influence on the uninvolved   National & International  economy  government  law enforcement   Collaboration  working together, individuals, & families have the power to protect themselves

Computers Add New Dimensions to Traditional Crimes  Homicide and other violent crimes (sexual assault)  Illegal Material  Child pornography  Drugs, Alcohol  Narcotics offenses  Data Theft  Fraud, counterfeiting  Dangerous Content  Bomb Making  Drug Making  Booby-Traps Computers have do not understand jurisdictional boundaries. Internet users are often anonymous and in cyberspace, anyone can transfer massive amounts of information almost instantaneously

Why is Cyberspace Dangerous? VIRTUAL ANONYMITY FOR CRIMINALS & DEVIANTS –Easy to create accounts with bogus information – services ask for little information –Other services require nothing more than an address –Rarely do services validate input –Availability of “Anonymizing Services” LACK OF PHYSICAL EVIDENCE –No doors to knock down, no windows to break, no fingerprints to leave behind –Criminal is faceless and often in another geographic area

The Increasing Cost of Computer Crime Bank Robbery - $2,500 + Bank Fraud - $25,000 + Computer Crime - $500,000 + Theft of Technology - $1,900,000 + ID Theft y - $2,500,000 +

FraudFraud  Auction frauds  Get-rich-quick schemes  Senior citizen scams  Phishing  Phony Prizes  Cheap Stuff  Hardware (Mp3 Players, Cameras, DVDs)  Software (Windows, MS-Office, Anti-Virus)

TheftTheft  Personally Identifying Information  Birthday, SSN, Banking data  Credit card numbers  Identity Theft  Computer Equipment  Usernames & Passwords

Narcotics and Gambling  Narcotics distribution  Unmatched convenience  compulsive & underage gamblers  Virtual casinos  gone with a keystroke  Day trading

Fatal Online Encounters

Online Harassment & Cyberstalking "It's actually obsene [sic] what you can find out about people on the Internet."– Liam Youens

Crimes Against Children  Child pornography  Exposure of Children to harmful content  Pornography  Graphic Violence  Hateful Content  Children lured into degrading situations  Chat Sessions  Chat rooms  Online Blogs  Social Networks  Children keep silent for many reasons  To protect family  Out of fear  Feelings of shame  To rebel against authority  For chance and thrill

HomicideHomicide  Violent criminals use computers  to acquire critical information about the victim(s)  as a tool for communication  as a storage device for evidence about motive and methods

The Many Faces of Computer Crime in the News Computer Evidence Used In the Courts  Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11  Homicides - Scott Peterson, Dennis Rader (BTK Killer)  Child Pornography - Michael Jackson  Espionage - Aldrich Ames  Insider Trading - Martha Stewart Case  Financial Fraud - ENRON

What Can You Do to Help?  Exert your influence  Law enforcement  Legislators & elected officials  Your family & friends  Practice & preach collaboration

Take Action to Protect Yourself & Your Family  Stay informed - technology changes  Learn about computer-dependent crimes  Network intrusions  Denial of service attacks  Hacking  bombs  Viruses & Trojan horses  Identity Theft  Learn how not to become a victim …

 Move home computers into family room or area   Familiarize yourself with the Internet   Utilize site/content blocking software or parental controls   Establish family rules and guidelines for safe Internet use  Discuss Internet crime and safety issues with your children - do it often Take Action to Protect Yourself & Your Family Never allow children to meet Internet friends

Take Action to Protect Yourself & Your Family  Don’t give out personal or family information  when signing up for groups  anywhere else online  Encourage Internet safety discussions in community schools, PTOs, PTAs, etc.   Randomly check your child’s and Internet web histories   Keep a written record of all logins, screen names and their passwords   Invite your children to talk to you when they find something objectionable

Take Action to Protect Yourself & Your Family  Urge legislators and officials to address the issues  send , snail mail, telephone  Support the efforts of your local law enforcement agencies  Report electronic crimes to your local law enforcement authorities   If your child is the victim of an online predator…  it is not their fault  be patient  be compassionate  contact authorities swiftly, time is critical

Warning Signs Your Child May Be in Trouble Online… ! Excessive use of the Internet, especially late at night ! Gifts, money or packages they can’t or won’t explain ! Computer or monitor is suddenly switched off, laptop lid shut, or other attempts to block the screen ! Strange long distance charges, phone calls from strangers, or lots of wrong numbers and hang-ups ! Your child is using an on-line account belonging to someone else ! Your child begins deleting s and internet history after use ! Buddies or addresses that your child won’t or can't easily identify who they all are in real life

Thank You for Your Time and Interest