Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Northside I.S.D. Acceptable Use Policy
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Chapter 14 Crime and Justice in the New Millennium
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
 It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Crime & Malpractice AS Module Heathcote Ch. 10.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Topic 5: Basic Security.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Hacking. What is hacking? A hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has.
Internet crime By: Brandon Murphy & Cameron Martin.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
GCSE ICT SECURITY THREATS.
A Project on CYBER SECURITY
Freedom Independence Transition
Security of network and information systems
Presentation transcript:

Whats it all about?

 C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the Internet.

 Telecommunication crime is the criminal activity of taping into phone lines. Listening to phone calls for criminal intent.

Cyber crime  Drug trafficking  Sexual harassment  Fraud  Bullying  terrorism Telecommunication crime  Drug trafficking  Sexual harassment  Fraud  Bullying  terrorism

 People committed to circumvention of computer security. This primarily concerns unauthorized remote computer break-ins via a communication networks such as the Internet

 Gary McKinnon was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13- month period from February 2001 to March 2002, illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.  McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.

 A new police Cyber Crime Unit is to be set up to protect Britain against the growing threat of attacks on the internet and in electronic communications.  Alongside the law enforcement unit, a new Joint Cyber Unit at the Government's GCHQ eavesdropping centre will develop the UK's military capabilities in cyberspace, Cabinet Office minister Francis Maude announced.  The teams form part of a £650 million Government drive to tackle what Mr Maude said was a "real and growing" threat to the UK's national interests from cyber attacks by organised criminals, terrorists, hostile states and "hacktivists".

 The RCMP have set out a line of recommendations/ practices and examples of computer crime which the use to warn the public of possible crime to do with their personal or work computer.

 Over a period of six months a person can acquire between $65,000 and $100,000 in fines & will be subsequently convicted of theft and will receive a prison sentence of three years.  This means anyone who breaks our criminal code are likely apprehended and convicted of there charges.

 Cyber ethics is the philosophic study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society.  People feel that these are not crimes because police enforcement are not paying closely monitoring this; they cannot worry about a friend creating a mix cd for a friend or a phone scam someone accidentally bought into all the time.

 Some common methods are:  Illegal downloads  Watching ppvs on free sites  Cyber bulling  Some more serious ones are:  Hacking  Child pornography  Virus intent programs  etc

 We have to become more aware because if we don’t eventually someone or something will get the ability to hack our accounts and destroy important data or illegally use our online banking deposits  Great ways to save from this happening are  Use a personal account pass code that no one knows  Always delete credit card numbers from devices  Always upgrade security software