Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Fundamentals

Similar presentations


Presentation on theme: "Computer Security Fundamentals"— Presentation transcript:

1 Computer Security Fundamentals
by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse

2 Chapter 3 Objectives Know the various types of Internet investment scams and auction frauds Know specific steps youcan take to avoid fraud on the Internet Have an understanding of what identity theft is and how it is done Know specific steps that can be taken to avoid identity theft © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

3 Chapter 3 Objectives- Cont.
Understand what cyber stalking is, and be familiar with relevant laws Know how to configure a web browsers privacy settings Know what laws apply to these computer crimes © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

4 Internet Fraud Works Investment Scams Auction Frauds Identity Theft
Shill bidding Bid shielding Bid siphoning Identity Theft Phishing Cross-Site Scripting © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

5 Investment Scams Pump and dump Investment advice
© 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

6 Laws About Internet Fraud
18 U.S.C. 1028, also known as The Identity Theft and Assumption Deterrence Act of 1998 State laws against cyber stalking © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

7 Identity Theft How bad is it? Phishing Spear phishing Whaling
© 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

8 Cyber Stalking What is it? Real-world cases
© 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

9 Cyber Stalking Cases What is it? Real-world cases
Robert James Murphy Massachusetts case How to evaluate cyber stalking © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

10 Protecting Against Investment Fraud
Only invest with well-known, reputable brokers. If it sounds too good to be true, then avoid it. Ask yourself why this person is informing you of this great investment deal. Why would a complete stranger decide to share some incredible investment opportunity with you? Remember that even legitimate investment involves risk, so never invest money that you cannot afford to lose. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

11 Protect Yourself Against Identity Theft
Do not provide your personal information to anyone if it is not absolutely necessary. Destroy documents that have personal information on them. Check your credit frequently. If your state has online driving records, then check yours once per year. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

12 Secure Browser Settings
Internet Explorer Firefox Chrome © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

13 Protect Yourself Against Auction Fraud
Only use reputable auction sites. If it sounds too good to be true, don’t bid. Some sites actually allow you to read feedback other buyers have provided on a given seller. Read the feedback, and only work with reputable sellers. When possible use a separate credit card (one with a low limit) for online auctions. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

14 Protect Yourself Against Cyber Stalking
If you use chat rooms, discussion boards, and so forth, do not use your real name. Set up a separate account with an anonymous service, such as Yahoo!, Gmail, or Hotmail. Then use that account and a fake name online. This makes it hard for an online stalker to trace back to you personally. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

15 Protect Yourself Against Cyber Stalking (cont.)
If you are the victim of online harassment, keep all the s in both digital and printed format. Use some of the investigative techniques you explore later in this book to try toidentify the perpetrator. If you are successful, then you can take the s and the information on the perpetrator to law enforcement officials. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

16 Protect Yourself Against Cyber Stalking (cont.)
Do not, in any case, ignore cyber stalking. According to the Working to Halt Online Abuse Web site,19 % of cyber stalking cases escalate to stalking in the real world. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse

17 Summary Clearly, fraud and identity theft are real and growing problems. In this modern age of instant access to information and online purchasing, it is critical that everyone takes steps to protect themselves against this issue. Cyber stalking is one area that is often new to both civilians and law enforcement. Unfortunately, cyber stalking cases can escalate into real-world violence. © 2016 Pearson, Inc Chapter 3 Cyber Stalking, Fraud, and Abuse


Download ppt "Computer Security Fundamentals"

Similar presentations


Ads by Google