COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
To Know what Cyber crime is
IT Security  .
A Project on CYBER SECURITY
COMPUTER CRIME.
Five Unethical Uses of Computers
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.

DO YOU KNOW ANYTHING ABOUT COMPUTER CRIMES? 1

YES OR NO 2

INTRODUCTION Although the technology have been improve from year to year but there are still have some individual outside involve in cyber crime. These cases have become major problem because most of the cybercrime activities are very difficult to solve it. With access to the Internet, some people will try to do malicious damage on computer and data stored in the computer. 3

COVERT MESSAGES Many different types of cyber crimes Cyber bullying- beware of what we comment in communication website, tell parents if fallen victim Downloads- make sure it is legal Computer virus- must know what action to take to protect our computers Must know how to protect ourselves from cyber crimes 4

PHISHING What is phishing? to obtain case sensitive information like password and username How it happen? sending an to unsuspecting clients, posing as an agent of banks Prevention checking the authenticity of banks website before entering their information 5

HACKING What is hacking? gain access into a user’s computer system without the user’s knowledge What they obtain? passwords to bank account, company’s data, and private information Example: hacking of IP addresses to slow down or confused enforcement 6

What is communication piracy? Some people copyright materials from others for their personal use. Examples of communication piracy? Downloading music, movies, and so on. Implication on the creator? The creators are unable to get their profit and had financial lost from their creation. COMMUNICATION PIRACY 7

What is electronic fund transfer fraud? An illegal action which transfer money without customer realize How is the modus operandi? Criminals created Trojan viruses that steal online banking log-in when customer sign on to their financial institution’s Phishing s which trick consumers into giving away their bank login information or other personal data. How to overcome the problem? to educate the customer on various issues like the risk of phishing, where the fraudsters set up a fake page that appears to be part of bank website. ELECTRONIC FUND TRANSFER FRAUD 8

ELECTRONIC VANDALISM, EXTORTION AND TERRORISM Electronic Vandalism An invasion to interfere operating system functions to damage the content and system. They also tore all that posted on the computer, doodle and stole computer equipment of expensive computer hardware Electronic Extortion Electronic extortion is a criminal offence which when a person unlawfully obtain property from person using electronic They are often disguised as other individuals using the names and photographs of other individuals for a particular purpose. 9

Electronic Terrorism A form of threat or attack on the computer, or network connections and data of information stored and protected by government or private. The security weakness provide a platform for computer hackers, intruders and identity thieves broke into the traffic to a computer system. Steal data important, such as credit card passwords, account number, and all personal information. 10

CONCLUSION Computer crime is everyone’s problem. Information is the best form of protection. Prevention method to solve the problems:  set your Firewalls  frequently changing password or ID number  have a safe surfing.  frequently checking for virus.  on your filters such as pop up blocker 11

CREDIT  s/grin699l.jpg s/grin699l.jpg  crime.jpg crime.jpg  TQ/L29QMNLauoU/s400/ _e23d7f46fb.jpg TQ/L29QMNLauoU/s400/ _e23d7f46fb.jpg  content/uploads/2011/08/what-is-computer-crime.jpg content/uploads/2011/08/what-is-computer-crime.jpg    Threat-of-Cyber-Terrorism.jpg Threat-of-Cyber-Terrorism.jpg 12