Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Protecting Your Identity: What to Know, What to Do.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Dealing the Cards of Credit Credit cards No set time to be paid back May pay in full, part, or minimum payment No finance charge if bill paid in full.
E-ACCESS  An example of technology use in e- Access are : 1.Laptop 2.Tablet 3.handphone.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Awareness Training
Unit Five Your Money: Keeping It Safe and Secure Part IV Info from: NEFE High School Financial Planning Program.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
CYBER CRIME. WHAT IS CYBER CRIME??? Also known a computer crime, digital crime, e-crime, and electronic crime. It means that Offences that are committed.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
ESCCO Data Security Training David Dixon September 2014.
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Be Cautious of Identity Theft By: Sydney Langley.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
E - ENTERPRISE PUAN NORIDAH BINTI ABU BAKAR CSC 434 SITI NADHRAH BINTI OTHMAN SPORT SCIENCE AND RECREATION /SR223 E – Enterprise is about business conducted.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
NAME:MOHD FIKRI B MUKHTAR LECTURER:PN NORIDAH BT ABU BAKAR SUBJECT:CSC 434.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
E- Enterpris e. What is e- Enterprise??? Business conducted online using any Internet based application. Designed to educate on appropriate online buying.
Consumer Protection Shop Safely and Guard Your Financial Information.
TAKE CARE OF YOUR CHQUE BOOK ETC. TAKE CARE  Please care of your cheques, passbook, Cards, PINs and other security informations to prevent fraud and.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Antigone Anticipation Guide 1. You are with someone who decides to commit an illegal act. By staying you implicate yourself in the crime as an accomplice.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Bullies R Us Cyber-Pals Security Blanket
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Practical Math: Credit Cards Chapter 7 Notes. Vocabulary credit card: a card that allows you to buy items now and pay later monthly statement: form like.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Internet Safety: Sharing Information Online. What are the risks of sharing information online? IDENTITY THEFT : steals your personal information and uses.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
National Crime Prevention Council 1 Identity Theft and Cybersafety.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Identity:
Things To Avoid: 1-Never your password to anyone.
Information Security Awareness 101
Presentation transcript:

Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal activities To forge documents and messages

Effects of Cyber Crimes Loss of Revenue/Profits Waste of Valuable Time Damaged Reputations Reduce Productivity

1 Dismantle the computer or laptop 2 Take out the hard drive 3 Physically destroy the hard drive

Keep your passwords, Personal Identification Number (PIN) and card numbers confidential. Look for the lock icon Use a firewall Install security updates

Keep your credit card safe Shred all documents with your credit card details on it Don’t sign blank credit card receipts Avoid giving out your credit card information Be cautions when using your credit card online Immediately report lost or stolen credit cards Never leave your credit card to someone else

Be aware of how much money you spend Think twice before making a purchase Set your objectives each time you go for online shopping

Exposure to online predators Pornography addiction Neglecting family and friends Compulsive online shopping or online gambling Online gaming addiction Sleep Disorder