Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.
tips to avoid cyber crime:
Ignore the unwanted messages or e-mails
Protect your e-identity (electronic identity)
Never store your own details on any mobile device (Secure mobile devices)
If in doubt, block
Ignore pop-ups
Only shop online on secure sites
Different site, different passwords (don’t use same key for all locks)
Lock down your FB account
Always make sure that login pages use SSL and that the login pages starts with https://
3. OBJECTIVES
After this presentation students will be able to
know:
1. What is cyber crime?
2. How it is occur ?, (define thorough types)
3. How to avoid from it ?
4.
5.
6. Cyber Crime
Use of computer /internet to
do something that would be a
crime in any case..
7. • Cyber crimes
• When any crime is committed over
the Internet it is referred to as a
cyber crime.
• When you purchase a home it
comes with a door and lock .you
always ensure that your lock and
doors are working properly . you
may even purchase a security
system.
8. • Likewise , your system is your home and
security tools are door / locks and security
tools.
• So if someone breaches into your
home’s(system), access all you personal
account and tempers your data , is the
criminal who is committing the crime.
• And committed crime is known as cyber
crime.
• That means we can say that cyber crime is an
illegal activity commotted on the internet.
9. • Hacking: This is a type of crime wherein a person’s computer
is broken into so that his personal or sensitive information can
be accessed. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person may
not be aware that his computer is being accessed from a
remote location.
10. • Cyber Stalking: This is a kind of online harassment wherein the
victim is subjected to a barrage of online messages and emails. Typically,
these stalkers know their victims and instead of resorting to offline
stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along
with cyber stalking to make the victims’ lives more miserable.
11.
12. Email spam and phishing
• Spam is electronic junk mail,
• unwanted messages sent by email, text
message or instant message without the
recipient’s permission
• Spam messages often contain offers of free
goods or prizes, cheap products. You might
be asked to buy something to win a prize or
to call or text a telephone number
13. Email spam and phishing
• Phishing is a way that criminals trick people into giving
out their personal or financial details.
• Phishing messages often imagine to come from legal
businesses, such as banks or telecommunications
providers.
• Phishing is the practice of attracting users to visit fake
Web sites in order to steal passwords, pin numbers and
other sensitive information.
• Do not respond to phishing messages. If you receive a
phishing message the best thing to do is delete it.
14. Email spam and phishing
Case study
• Mark is 42 years old and lives in Adelaide. He
receives an email from his bank which says his
internet banking password needs to be
changed. He clicks the link in the email and
resets his password. The next day, he realises
that the email was not actually from his bank.
He checks his account and finds $1000 is
missing.
15. Identity theft
• When a criminal gains access to your personal
information (such as your name, address, date of birth
or bank account details) to steal money or gain other
benefits.
• They can also use your personal information to create
fake identity in your name
• How does identity theft occur?
• Criminals may attempt to gain your personal
information using a number of different techniques
• Phishing: you may provide personal information over
the phone or internet
16. Online scam or fraud
• These are false schemes that seek to
take advantage of innocent people to
gain a benefit (such as money, or
access to personal details).
• These are often contained
in spam and phishing messages.
17. Online scam or fraud
Common types of online scams include:
1. Unexpected prize scams: They inform you that you have won a
prize (e/g. money, shopping vouchers, etc) and to claim it you
are asked to send money or provide personal information.
2. Dating or romance scams
3. Jobs and investment scams: Job scams target people who are
looking for a new job or who want to work from home.
4. Identity theft
• Do not respond to online scams or fraud. If you receive an email
or SMS which looks like a scam, the best thing to do is delete it.
18. Attacks on computer systems
• unauthorised access or hacking : use your
computer or devices without permission
• malware : malicious software (such as viruses,
trojans and spyware) Criminals may use malicious
software (or malware) to monitor your online
activity and cause damage to the computer.
• Malware is often downloaded when people open
an infected email attachment or click a
mistrustful link in an email.
• Malware can also be used to steal your
usernames, passwords or other information
19. Tips to avoid cybercrime
• Be social media savvy:
Make sure your social networking profiles (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are set
to private. Check your security settings. Be
careful what information you post online.
Once it is on the Internet, it is extremely
difficult to remove.
20. Tips to avoid cybercrime
1. Ignore the unwanted messages or e-mails
2. Protect your e-identity (electronic identity)
3. Never store your own details on any mobile device (Secure
mobile devices)
4. If in doubt, block
5. Ignore pop-ups
6. Only shop online on secure sites
7. Different site, different passwords (don’t use same key for
all locks)
8. Lock down your FB account
9. Always make sure that login pages use SSL and that the
login pages starts with https://
21. CONCLUSION
Technology is negative only in the hands of
people who do not realize that they are one and
the same process as the universe.