The document discusses cybercrime and different types of cybercrimes such as hacking, copyright infringement, fraud, child pornography, identity theft, and computer viruses. It also discusses reasons for cybercrime such as financial gain, making a political or social point, or intellectual challenge. Finally, it provides tips on how to stop cybercrime such as education, using a firewall, practicing safe surfing and shopping, using comprehensive security, and using strong passwords.
The document discusses cybercrime and different types of cybercrimes such as hacking, copyright infringement, fraud, child pornography, identity theft, and computer viruses. It also discusses reasons for cybercrime such as financial gain, making a political or social point, or intellectual challenge. Finally, it provides tips on how to stop cybercrime such as education, using a firewall, practicing safe surfing and shopping, using comprehensive security, and using strong passwords.
Original Description:
A Grade 8 ppt presentation focused on what cybercime is, its types, and how to avoid cybercrime.
The document discusses cybercrime and different types of cybercrimes such as hacking, copyright infringement, fraud, child pornography, identity theft, and computer viruses. It also discusses reasons for cybercrime such as financial gain, making a political or social point, or intellectual challenge. Finally, it provides tips on how to stop cybercrime such as education, using a firewall, practicing safe surfing and shopping, using comprehensive security, and using strong passwords.
The document discusses cybercrime and different types of cybercrimes such as hacking, copyright infringement, fraud, child pornography, identity theft, and computer viruses. It also discusses reasons for cybercrime such as financial gain, making a political or social point, or intellectual challenge. Finally, it provides tips on how to stop cybercrime such as education, using a firewall, practicing safe surfing and shopping, using comprehensive security, and using strong passwords.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1/ 27
GROUP 4
One unforeseen consequence
of the rise of the internet has been the innumerable and continuous crimes being committed online What is Cybercrime? Cybercrime is crime that involves a computer and a network. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Cybercrimes are committed against individuals with a criminal motive to intentionally harm the reputation of the victim directly or indirectly. What are the different types of Cybercrime? Issues surrounding these types of crimes have become high-profile, particularly those surrounding: Hacking Copyright Infringement Fraud Child Pornography Identity Theft and Invasion of Privacy Computer Viruses Hacking In simple words, hacking is an act committed by an intruder by accessing your computer system without your permission. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system. Copyright Infringement Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. It is often referred to as “Piracy”. Fraud There are three common types of fraud: Internet, Wire, and ATM Fraud. Cyber fraud refers to any type of deliberate deception for unfair or unlawful gain that occurs online. The most common form is online credit card theft. Child Pornography Federal and state laws make it a crime to produce, possess, distribute, or sell pornographic materials that exploit or portray a minor (under the age of 18). Child pornography laws are being utilized to punish use of computer technology and the Internet to obtain, share, and distribute pornographic material involving children, including images and films. Identity Theft and Invasion of Privacy Identity Theft occurs when someone steals your identity and pretends to be you to access resources such as credit cards, bank accounts and other benefits in your name. The imposter may also use your identity to commit other crimes. Computer Viruses A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot" sector of the hard drive. In the process a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. Why does Cybercrime happen? Cyber-attacks are hitting the headlines on a daily basis and a lot of effort goes into both preventing them and dealing with the consequences when they have happened. Understanding the motivation behind attacks can help organizations understand more about the risks they face so that they can tackle them. 1. FINANCIAL GAIN This is the most likely reason an organization get attacked. Criminals are looking to gain financially. Criminal gangs are well-organized and operate on a commercial basis – there is a supply chain, those that steal data are unlikely to be the same criminals who commit the identity theft and fraud. The dark web provides a market place for stolen credentials – with those that have stolen personal data selling it on to those who wish to commit fraud. 2. TO MAKE A POLITICAL OR SOCIAL POINT Hacktivism involves breaking into a system for political or social reasons. Until relatively recently, this was seen as the domain of underground organizations such as Anonymous. Hackivists look to access information that can damage their intended target. Governments and political bodies are often the target of Denial of Service attacks. Many businesses may feel that they are unlikely to be a target for political or social hactivists, though it is well to be aware that the targets of these attacks vary greatly. 3. FOR THE INTELLECTUAL CHALLENGE Those who hack for intellectual stimulation are not necessarily criminals. They could be “white hat” hackers who help organizations to explore their vulnerabilities so that they can put defenses in place. While white hat hackers work with or for companies and are a force for good, other hackers motivated by intellectual challenge can cause harm. While they may not have bad intentions hackers, particularly the inexperienced who are often referred to as ‘script kiddies’ can cause damage during their incursions and leave systems vulnerable to those with ill intent. HOW CAN WE STOP CYBERCRIME? 1. EDUCATION Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. These scams often play off major new stories, so keep informed on the latest news-related scams. 2. USE A FIREWALL Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. 3. CLICK WITH CAUTION When you’re checking your email or chatting over instant messenger (IM), be careful not to click on any links in messages from people you don’t know. The link could take you to a fake website that asks for your private information, such as user names and passwords, or it could download malware onto your computer. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates that the message is legitimate. 4. PRACTICE SAFE SURFING When navigating the web, you need to take precautions to avoid phony websites that ask for your personal information and pages that contain malware. Use a search engine to help you navigate to the correct web address since it will correct misspellings. That way, you won’t wind up on a fake page at a commonly misspelled address. 5. PRACTICE SAFE SHOPPING You also need to be careful where you shop online. Be cautious when shopping at a site that you’ve never visited before and do a little investigation before you enter your payment information. Look for a trustmark, such as McAfee SECURE™, to tell you if a site is safe. And when you’re on a payment page, look for the lock symbol in your browser, indicating that the siteuses encryption, or scrambling, to keep your information safe. 6. USE COMPREHENSIVE SECURITY SYSTEM AND KEEP YOUR SYSTEM UPDATED Because hackers have a wide variety of ways to access your system and information, you need comprehensive security software that can protect you from all angles such as Kaspersky, Norton, or McAfee. Also don’t forget to perform regular scans. 7. SECURE YOUR WIRELESS NETWORK Hackers can access data while it’s in transit on an unsecured wireless network. Cybercriminals often know the default passwords and they can use them to hack into your network. You may also want to set up your router so it only allows access to people with passwords that are encrypted. 8. USE STRONG PASSWORDS Although it may be easier for you to remember short passwords that reference your birthday, middle name, or pet’s name, these kinds of passwords also make it easy for hackers. Strong passwords can go a long way in helping secure your information, so choose a password that is at least 10 characters long and consists of a combination of letters, numbers and special characters. Also consider changing your password periodically to reduce the likelihood of it being compromised. 9. USE COMMON SENSE Despite the warnings, cybercrime is increasing, fueled by common mistakes people make such as responding to spam and downloading attachments from people they don’t know. So, use common sense whenever you’re on the Internet. Never post personal information online or share sensitive information such as your social security number and credit card number. Exercise caution when clicking on any links or downloading any programs. 10. BE SUSPICIOUS Even if you consider yourself cyber savvy, you still need to keep your guard up for any new tricks and be proactive about your safety. Backup your data regularly in case anything goes wrong, and monitor your accounts and credit reports to make sure that a hacker has not stolen your information or identity. Although protecting yourself does take some effort, remember that there are a lot of resources and tools to help you. And by adopting a few precautions and best practices, you can help keep cybercrime from growing.