SlideShare a Scribd company logo
1 of 29
CYBER CRIME
Grade 10 students 
ICT INTEGRATED INTO LEADERSHIP AND 
SERVICE 
17th October, 2014. 
Surefoot International School 
Calabar, Nigeria.
Cybercrime is a term for any illegal activity that uses a 
computer as its primary means of commission. The U.S. 
Department of Justice expands the definition of 
cybercrime to include any illegal activity that uses a 
computer for the storage of evidence.
Types of cyber crimes 
1. HACKING
This is the process of gaining unauthorized 
access into a computer system or data belonging 
to someone else. 
Types range from outside parties who hack into a 
computer network to phishing programs which 
give users a false sense of security, prompting 
them to divulge sensitive information.
2. ELECTRONIC FUNDS TRANSFER 
FRAUD
Electronic funds transfer systems have begun to 
be exploited, and so has the risk that such 
transactions may be intercepted and diverted. 
Valid credit card numbers can be intercepted 
electronically, as well as physically; the digital 
information stored on a card can be 
counterfeited.
DISSEMINATION OF 
OFFENSIVE 
MATERIALS
There are many others like: 
THEFT OF TELECOMMUNICATIONS SERVICES 
COMMUNICATIONS IN FURTHERANCE OF 
CRIMINAL CONSPIRACIES 
TELECOMMUNICATIONS PIRACY 
ELECTRONIC MONEY LAUNDERING AND TAX 
EVASION 
E.T.C
EFFECTS OF CYBERCRIME
THE EFFECTS 
The effects may vary from: 
Loss Of Revenue 
Wasted Time 
Damaged Reputations 
Reproduced Productivity
LOSS OF REVENUE 
One of the main effects of cyber 
crime on a company is a loss of 
revenue. This loss can be caused by 
an outside party who obtains 
sensitive financial information, using 
it to withdraw funds from an 
organization. It can also occur when 
a business's e-commerce site
WASTED TIME 
Another major effect or 
consequence of cyber crime is the 
time that is wasted when an IT 
personnel devotes great portions of 
their day handling such incidences. 
Rather than working on productive 
measures for an organization, many 
IT staff members spend a large
DAMAGED 
REPUTATIONS 
In cases where customer records 
are compromised by a security 
breach associated with cyber crime, 
a company's reputation can take a 
major hit. Customers whose credit 
cards or other financial data 
become intercepted by hackers or 
other infiltrators
REDUCED PRODUCTIVITY 
Due to the measures that many 
companies must implement to 
stabilize cyber crime, there is often 
a negative effect on employees' 
productivity. This is due to security 
measures, employees must enter 
more passwords and perform other 
time-consuming acts in order to do
So far, we have seen that, 
cybercrimes are done through 
computer networks, which enable 
hackers to get ones personal 
information (hacking) and use it for 
illegal activities. 
Let’s have a look at how to 
prevent cybercrimes.
PREVENTION 
Secure your computer 
•Activate your firewall 
•Use anti-virus software 
•Block spyware attacks 
•Keep your system updated 
 Protect your E-identity
CALL FOR HELP 
If you are a victim, if you 
encounter illegal Internet content 
(e.g. child exploitation) or if you 
suspect a computer crime, identity 
theft or a commercial scam, report 
this to your local police.
EDUCATION 
Hackers aren’t the only ones who 
can gain power from information. 
By educating yourself about the 
types of scams that exist on the 
Internet and how to avert them, 
you are putting yourself one step 
ahead of the cybercriminals.
CLICK WITH CAUTION 
•When you’re on internet, be 
careful not to click on any link in 
messages from people you don’t 
know. Even if the message is 
from someone you know, be 
cautious. Some viruses replicate 
and spread through email, so look 
for information that indicates
PRACTICE SAFE SHOPPING 
Be cautious when 
shopping at a site 
that you’ve never 
visited before and do 
a little investigation 
before you enter your 
payment information.
BE CAREFUL ON WI-FI 
Laptops and phones both 
‘remember’ Wi-Fi networks which 
they have ‘used’ – so hackers can 
use this to break in. Avoid 
conducting financial or corporate 
transactions on public networks. 
Also, Wi-Fi (wireless) networks at
USE STRONG PASSWORDS 
Although it may be easier for you 
to remember short passwords, 
strong passwords can go a long way 
in helping secure your information, 
so choose a password that consists 
of a combination of letters, 
numbers and special characters and
COMMANDMENTS ON 
CYBERCRIME 
•I will not share personal data with whomsoever it may be, 
unless known. 
•I will never meet someone in person with whom i come across 
online. 
•I will not post or download inappropriate files on the internet. 
•I will not share my password with anyone.
COMMANDMENTS ON 
CYBERCRIME 
•I will not do any bank transactions on public Wi-Fi as it may 
subject to banking fraud. 
•I will not click on any unknown links as they may contain 
harmful viruses.
THE 
END 
Presented By 
Chaitali 
Ebito 
Tega 
Emaediong 
Oscar 
ICT Coordinator - Mohan Robert 
Homeroom Teacher - Emmanuel Isong 
ICT Support - Caleb

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Viewers also liked

Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
Harsha Matta
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
Rex Galos
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (14)

Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary School
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And Punishment
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Crime

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 

Similar to Cyber Crime (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Information security
Information securityInformation security
Information security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Cyber Crime

  • 2. Grade 10 students ICT INTEGRATED INTO LEADERSHIP AND SERVICE 17th October, 2014. Surefoot International School Calabar, Nigeria.
  • 3.
  • 4. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. Types of cyber crimes 1. HACKING
  • 6. This is the process of gaining unauthorized access into a computer system or data belonging to someone else. Types range from outside parties who hack into a computer network to phishing programs which give users a false sense of security, prompting them to divulge sensitive information.
  • 7. 2. ELECTRONIC FUNDS TRANSFER FRAUD
  • 8. Electronic funds transfer systems have begun to be exploited, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.
  • 10. There are many others like: THEFT OF TELECOMMUNICATIONS SERVICES COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES TELECOMMUNICATIONS PIRACY ELECTRONIC MONEY LAUNDERING AND TAX EVASION E.T.C
  • 11.
  • 13. THE EFFECTS The effects may vary from: Loss Of Revenue Wasted Time Damaged Reputations Reproduced Productivity
  • 14. LOSS OF REVENUE One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site
  • 15. WASTED TIME Another major effect or consequence of cyber crime is the time that is wasted when an IT personnel devotes great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large
  • 16. DAMAGED REPUTATIONS In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators
  • 17. REDUCED PRODUCTIVITY Due to the measures that many companies must implement to stabilize cyber crime, there is often a negative effect on employees' productivity. This is due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do
  • 18. So far, we have seen that, cybercrimes are done through computer networks, which enable hackers to get ones personal information (hacking) and use it for illegal activities. Let’s have a look at how to prevent cybercrimes.
  • 19. PREVENTION Secure your computer •Activate your firewall •Use anti-virus software •Block spyware attacks •Keep your system updated  Protect your E-identity
  • 20. CALL FOR HELP If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police.
  • 21. EDUCATION Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals.
  • 22. CLICK WITH CAUTION •When you’re on internet, be careful not to click on any link in messages from people you don’t know. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates
  • 23. PRACTICE SAFE SHOPPING Be cautious when shopping at a site that you’ve never visited before and do a little investigation before you enter your payment information.
  • 24. BE CAREFUL ON WI-FI Laptops and phones both ‘remember’ Wi-Fi networks which they have ‘used’ – so hackers can use this to break in. Avoid conducting financial or corporate transactions on public networks. Also, Wi-Fi (wireless) networks at
  • 25. USE STRONG PASSWORDS Although it may be easier for you to remember short passwords, strong passwords can go a long way in helping secure your information, so choose a password that consists of a combination of letters, numbers and special characters and
  • 26.
  • 27. COMMANDMENTS ON CYBERCRIME •I will not share personal data with whomsoever it may be, unless known. •I will never meet someone in person with whom i come across online. •I will not post or download inappropriate files on the internet. •I will not share my password with anyone.
  • 28. COMMANDMENTS ON CYBERCRIME •I will not do any bank transactions on public Wi-Fi as it may subject to banking fraud. •I will not click on any unknown links as they may contain harmful viruses.
  • 29. THE END Presented By Chaitali Ebito Tega Emaediong Oscar ICT Coordinator - Mohan Robert Homeroom Teacher - Emmanuel Isong ICT Support - Caleb

Editor's Notes

  1. Also look at the address bar to see if the site starts with “https://” instead of “http://” as this is another way to see if the site uses encryption.
  2. 10 characters long