SlideShare uma empresa Scribd logo
1 de 46
A Computer Ethics
        Seminar
          Presented by:
       Jennifer June Jaen


University of the Philippines
     Open University
           Computer Ethics
Internet
 Crime
  and
 Safety
                       Sept. 9, 2012
                         Cebu City
     Computer Ethics
Objectives of the Seminar
• To be able to identify vulnerabilities in the use of the
Internet such as in social networking sites, e-
commerce, and e-mail
• To be able to identify, detect, and protect from certain
types of cyber-attacks such as cyber-bullying, unethical
hacking, and identity theft

• To identify the role of privacy and freedom of
expression in the proliferation of Internet crime such as
pornography

                         Computer Ethics
It is a crime committed using a computer or
the Internet by an individual or organization.

                   Computer Ethics
Perpetrators of Cybercrime
• Hackers
 Test limit of system and gain publicity

• Crackers
 Steal data, corrupt systems, create problems




                    Computer Ethics
Perpetrators of Cybercrime
• Insider
  Corrupt systems, make money
• Industrial spy
  Capture trade secrets, for competition




                   Computer Ethics
Perpetrators of Cybercrime
• Cybercriminal
 Make money

• Cyber-terrorist
 Destroy key infrastructure



                Computer Ethics
Virus
These are malicious software that are
created by cybercriminals who use the
internet to perpetrate their crimes




                Computer Ethics
Spam
Spam is the abuse of electronic
messaging systems to indiscriminately
send unsolicited bulk messages




                 Computer Ethics
Scam




Computer Ethics
Scam examples




    Computer Ethics
Phishing

 It is an attempt to acquire information
such as usernames, passwords, credit
card details by masquerading as a
legitimate business.




                  Computer Ethics
Phishing
The senders are phishing for your
personal information so they can
use it to commit fraud.




               Computer Ethics
Phising Example




     Computer Ethics
Phising Example




     Computer Ethics
Detect and Avoid Phishing

Be wary of links and pop-ups from e-
mails and browsers.




               Computer Ethics
Detect and Avoid Phishing




          Computer Ethics
Identity Theft
Identity theft occurs when someone uses your
personally identifying information, like your
name, Social Security number, or credit card
number, without your knowledge, to commit fraud or
other crimes.




                      Computer Ethics
How Identity Thieves Steal
• Phishing
Pretend to be legitimate companies and send spam or
pop-up messages to trick you to revealing your
personal information.
• Skimming
Use special storage device to steal credit/debit card
information during processing




                         Computer Ethics
How Identity Thieves Steal
• Dumpster Diving
Rummage through trash looking for bills or documents
with your personal data on it

• Old-Fashioned Stealing
Steal wallets and purses, mail, bank
and credit card statements, or
personnel records



                        Computer Ethics
What Thieves Do with
                Stolen Identity
• May open new bank accounts in your name
• May open new credit card accounts in your name
• May open new phone account and other accounts in
your name
• May use your name to obtain utility services like
electricity, cable, etc.
•May obtain loan in your name
•May do purchases like house, clothes and avail of trips
and other luxuries in your name

                           Computer Ethics
Is Your Identity stolen?
• You are charged for debts you didn’t incur

• You receive mails about houses or
apartments you didn’t buy or jobs you
never had
• Be denied of loans due to bad credit
history caused by others



                     Computer Ethics
Combat Identity Theft

Deter
     Detect
                    Defend

        Computer Ethics
Passwords
• Create strong passwords and change
them often
• Never give your password or
account numbers to anyone




               Computer Ethics
Browsing
• Enter the URL when doing sensitive
transactions
• Access secure websites. Look for
https:// or a lock.




                Computer Ethics
Software

• Do not download software or
images from unknown sources




              Computer Ethics
Software

• Install firewall and anti-virus and
anti-spyware software.




               Computer Ethics
Social Networking


 An online service, platform, or site that helps
build social networks or social relations among
 people with shared interests, background, or
              real life connections.




                     Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking
                 Dangers
Exposure to predators and cybercrimes
• Scam/Phishing
• Theft
• Stalking
• Invasion of privacy
• Child Exploitation
• Pornography
                   Computer Ethics
Online Dating
Many people use dating sites, social
networking sites, and chat rooms to meet
people. And some forge successful
relationships.




                  Computer Ethics
Online Dating
                     Dangers
But predators also use these sites to meet
potential victims.
• They create fake profiles to build online
relationships.
• Eventually convince people to send them
money or do other favors in the name of
love.
• Or worse, do other crimes like rape and
other forms of abuse.

                        Computer Ethics
Online Dating
             Dangers


An online love interest who asks
for money is almost certainly a
scam artist.




               Computer Ethics
Parental Control Tips
                                      Check
Limit your kid's                     websites
  time online.
                                Avoid
                               sex talk
   No to cyber-
    bullying
                   Who are in your kid’s
                      contact list?
                   Computer Ethics
Computer Ethics
Cyber-bullying

Posting hurtful and harmful messages
or material to others on the Internet




               Computer Ethics
Cyber-bullying may occur in
• E-mail
• Instant messaging
• Chat rooms
• Social networking sites
• Forums
• Blogs

                Computer Ethics
Examples of Cyber-bullying




          Computer Ethics
How to Protect Yourself from
        Online Predators
• Do not give too much information about
                 yourself




                 Computer Ethics
How to Protect Yourself from
           Online Predators
• Set the right privacy settings



          Get secured!

                      Computer Ethics
How to Protect Yourself from
     Online Predators




           Computer Ethics
How to Protect Yourself from
          Online Predators
• Increase your awareness of cybercrime


Knowledge
  is Key!


                   Computer Ethics
Thank you for coming! 



         Computer Ethics
References
                     Ethics in Information Technology, G. Reynolds
  http://www.bizymoms.com/computers-and-technology/uses-of-the-internet.html
                    http://en.wikipedia.org/wiki/Spam_(electronic)
                       http://en.wikipedia.org/wiki/Email_spam
                         http://en.wikipedia.org/wiki/Phishing
         http://www.scamwatch.gov.au/content/index.phtml/tag/onlinescams
                                 http://onguardonline.gov
     http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
                             http://www.identitytheft.org/
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
                 http://www.familysafecomputers.org/predators.htm
            http://www.ebizmba.com/articles/social-networking-websites
       http://www.slideshare.net/burtlo/introduction-to-cybersafety-5690788
              http://www.slideshare.net/karlmp/internet-safety-2956537
  http://www.slideshare.net/grp4.ed451/cyber-predator-presentation-presentation
                 http://www.slideshare.net/caskeyd/students-i-safety
 http://www.msnbc.msn.com/id/6083442/ns/dateline_nbc/t/dangers-children-face-
                                 online/#.UEWpW8EgfSg

                                   Computer Ethics

Mais conteúdo relacionado

Mais procurados (20)

Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying [autosaved]
Bullying [autosaved]Bullying [autosaved]
Bullying [autosaved]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-Integrity
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying -
Cyberbullying - Cyberbullying -
Cyberbullying -
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Destaque

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Mark Peralta
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Sonnie Santos
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringLemi Orhan Ergin
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software DevelopmentLemi Orhan Ergin
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

Destaque (16)

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software Development
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Semelhante a IS201 Internet Crime and Safety

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 

Semelhante a IS201 Internet Crime and Safety (20)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Último (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

IS201 Internet Crime and Safety

  • 1. A Computer Ethics Seminar Presented by: Jennifer June Jaen University of the Philippines Open University Computer Ethics
  • 2. Internet Crime and Safety Sept. 9, 2012 Cebu City Computer Ethics
  • 3. Objectives of the Seminar • To be able to identify vulnerabilities in the use of the Internet such as in social networking sites, e- commerce, and e-mail • To be able to identify, detect, and protect from certain types of cyber-attacks such as cyber-bullying, unethical hacking, and identity theft • To identify the role of privacy and freedom of expression in the proliferation of Internet crime such as pornography Computer Ethics
  • 4. It is a crime committed using a computer or the Internet by an individual or organization. Computer Ethics
  • 5. Perpetrators of Cybercrime • Hackers Test limit of system and gain publicity • Crackers Steal data, corrupt systems, create problems Computer Ethics
  • 6. Perpetrators of Cybercrime • Insider Corrupt systems, make money • Industrial spy Capture trade secrets, for competition Computer Ethics
  • 7. Perpetrators of Cybercrime • Cybercriminal Make money • Cyber-terrorist Destroy key infrastructure Computer Ethics
  • 8. Virus These are malicious software that are created by cybercriminals who use the internet to perpetrate their crimes Computer Ethics
  • 9. Spam Spam is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages Computer Ethics
  • 11. Scam examples Computer Ethics
  • 12. Phishing It is an attempt to acquire information such as usernames, passwords, credit card details by masquerading as a legitimate business. Computer Ethics
  • 13. Phishing The senders are phishing for your personal information so they can use it to commit fraud. Computer Ethics
  • 14. Phising Example Computer Ethics
  • 15. Phising Example Computer Ethics
  • 16. Detect and Avoid Phishing Be wary of links and pop-ups from e- mails and browsers. Computer Ethics
  • 17. Detect and Avoid Phishing Computer Ethics
  • 18. Identity Theft Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your knowledge, to commit fraud or other crimes. Computer Ethics
  • 19. How Identity Thieves Steal • Phishing Pretend to be legitimate companies and send spam or pop-up messages to trick you to revealing your personal information. • Skimming Use special storage device to steal credit/debit card information during processing Computer Ethics
  • 20. How Identity Thieves Steal • Dumpster Diving Rummage through trash looking for bills or documents with your personal data on it • Old-Fashioned Stealing Steal wallets and purses, mail, bank and credit card statements, or personnel records Computer Ethics
  • 21. What Thieves Do with Stolen Identity • May open new bank accounts in your name • May open new credit card accounts in your name • May open new phone account and other accounts in your name • May use your name to obtain utility services like electricity, cable, etc. •May obtain loan in your name •May do purchases like house, clothes and avail of trips and other luxuries in your name Computer Ethics
  • 22. Is Your Identity stolen? • You are charged for debts you didn’t incur • You receive mails about houses or apartments you didn’t buy or jobs you never had • Be denied of loans due to bad credit history caused by others Computer Ethics
  • 23. Combat Identity Theft Deter Detect Defend Computer Ethics
  • 24. Passwords • Create strong passwords and change them often • Never give your password or account numbers to anyone Computer Ethics
  • 25. Browsing • Enter the URL when doing sensitive transactions • Access secure websites. Look for https:// or a lock. Computer Ethics
  • 26. Software • Do not download software or images from unknown sources Computer Ethics
  • 27. Software • Install firewall and anti-virus and anti-spyware software. Computer Ethics
  • 28. Social Networking An online service, platform, or site that helps build social networks or social relations among people with shared interests, background, or real life connections. Computer Ethics
  • 29. Social Networking Sites 15 Most Visited Computer Ethics
  • 30. Social Networking Sites 15 Most Visited Computer Ethics
  • 31. Social Networking Sites 15 Most Visited Computer Ethics
  • 32. Social Networking Dangers Exposure to predators and cybercrimes • Scam/Phishing • Theft • Stalking • Invasion of privacy • Child Exploitation • Pornography Computer Ethics
  • 33. Online Dating Many people use dating sites, social networking sites, and chat rooms to meet people. And some forge successful relationships. Computer Ethics
  • 34. Online Dating Dangers But predators also use these sites to meet potential victims. • They create fake profiles to build online relationships. • Eventually convince people to send them money or do other favors in the name of love. • Or worse, do other crimes like rape and other forms of abuse. Computer Ethics
  • 35. Online Dating Dangers An online love interest who asks for money is almost certainly a scam artist. Computer Ethics
  • 36. Parental Control Tips Check Limit your kid's websites time online. Avoid sex talk No to cyber- bullying Who are in your kid’s contact list? Computer Ethics
  • 38. Cyber-bullying Posting hurtful and harmful messages or material to others on the Internet Computer Ethics
  • 39. Cyber-bullying may occur in • E-mail • Instant messaging • Chat rooms • Social networking sites • Forums • Blogs Computer Ethics
  • 40. Examples of Cyber-bullying Computer Ethics
  • 41. How to Protect Yourself from Online Predators • Do not give too much information about yourself Computer Ethics
  • 42. How to Protect Yourself from Online Predators • Set the right privacy settings Get secured! Computer Ethics
  • 43. How to Protect Yourself from Online Predators Computer Ethics
  • 44. How to Protect Yourself from Online Predators • Increase your awareness of cybercrime Knowledge is Key! Computer Ethics
  • 45. Thank you for coming!  Computer Ethics
  • 46. References Ethics in Information Technology, G. Reynolds http://www.bizymoms.com/computers-and-technology/uses-of-the-internet.html http://en.wikipedia.org/wiki/Spam_(electronic) http://en.wikipedia.org/wiki/Email_spam http://en.wikipedia.org/wiki/Phishing http://www.scamwatch.gov.au/content/index.phtml/tag/onlinescams http://onguardonline.gov http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx http://www.identitytheft.org/ http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html http://www.familysafecomputers.org/predators.htm http://www.ebizmba.com/articles/social-networking-websites http://www.slideshare.net/burtlo/introduction-to-cybersafety-5690788 http://www.slideshare.net/karlmp/internet-safety-2956537 http://www.slideshare.net/grp4.ed451/cyber-predator-presentation-presentation http://www.slideshare.net/caskeyd/students-i-safety http://www.msnbc.msn.com/id/6083442/ns/dateline_nbc/t/dangers-children-face- online/#.UEWpW8EgfSg Computer Ethics