For academic purposes only.
Sources of information are compiled and indicated in the Reference section of the presentation. Images or pictures are obtained from Google search.
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
IS201 Internet Crime and Safety
1. A Computer Ethics
Seminar
Presented by:
Jennifer June Jaen
University of the Philippines
Open University
Computer Ethics
2. Internet
Crime
and
Safety
Sept. 9, 2012
Cebu City
Computer Ethics
3. Objectives of the Seminar
• To be able to identify vulnerabilities in the use of the
Internet such as in social networking sites, e-
commerce, and e-mail
• To be able to identify, detect, and protect from certain
types of cyber-attacks such as cyber-bullying, unethical
hacking, and identity theft
• To identify the role of privacy and freedom of
expression in the proliferation of Internet crime such as
pornography
Computer Ethics
4. It is a crime committed using a computer or
the Internet by an individual or organization.
Computer Ethics
5. Perpetrators of Cybercrime
• Hackers
Test limit of system and gain publicity
• Crackers
Steal data, corrupt systems, create problems
Computer Ethics
6. Perpetrators of Cybercrime
• Insider
Corrupt systems, make money
• Industrial spy
Capture trade secrets, for competition
Computer Ethics
7. Perpetrators of Cybercrime
• Cybercriminal
Make money
• Cyber-terrorist
Destroy key infrastructure
Computer Ethics
8. Virus
These are malicious software that are
created by cybercriminals who use the
internet to perpetrate their crimes
Computer Ethics
9. Spam
Spam is the abuse of electronic
messaging systems to indiscriminately
send unsolicited bulk messages
Computer Ethics
12. Phishing
It is an attempt to acquire information
such as usernames, passwords, credit
card details by masquerading as a
legitimate business.
Computer Ethics
13. Phishing
The senders are phishing for your
personal information so they can
use it to commit fraud.
Computer Ethics
18. Identity Theft
Identity theft occurs when someone uses your
personally identifying information, like your
name, Social Security number, or credit card
number, without your knowledge, to commit fraud or
other crimes.
Computer Ethics
19. How Identity Thieves Steal
• Phishing
Pretend to be legitimate companies and send spam or
pop-up messages to trick you to revealing your
personal information.
• Skimming
Use special storage device to steal credit/debit card
information during processing
Computer Ethics
20. How Identity Thieves Steal
• Dumpster Diving
Rummage through trash looking for bills or documents
with your personal data on it
• Old-Fashioned Stealing
Steal wallets and purses, mail, bank
and credit card statements, or
personnel records
Computer Ethics
21. What Thieves Do with
Stolen Identity
• May open new bank accounts in your name
• May open new credit card accounts in your name
• May open new phone account and other accounts in
your name
• May use your name to obtain utility services like
electricity, cable, etc.
•May obtain loan in your name
•May do purchases like house, clothes and avail of trips
and other luxuries in your name
Computer Ethics
22. Is Your Identity stolen?
• You are charged for debts you didn’t incur
• You receive mails about houses or
apartments you didn’t buy or jobs you
never had
• Be denied of loans due to bad credit
history caused by others
Computer Ethics
28. Social Networking
An online service, platform, or site that helps
build social networks or social relations among
people with shared interests, background, or
real life connections.
Computer Ethics
32. Social Networking
Dangers
Exposure to predators and cybercrimes
• Scam/Phishing
• Theft
• Stalking
• Invasion of privacy
• Child Exploitation
• Pornography
Computer Ethics
33. Online Dating
Many people use dating sites, social
networking sites, and chat rooms to meet
people. And some forge successful
relationships.
Computer Ethics
34. Online Dating
Dangers
But predators also use these sites to meet
potential victims.
• They create fake profiles to build online
relationships.
• Eventually convince people to send them
money or do other favors in the name of
love.
• Or worse, do other crimes like rape and
other forms of abuse.
Computer Ethics
35. Online Dating
Dangers
An online love interest who asks
for money is almost certainly a
scam artist.
Computer Ethics
36. Parental Control Tips
Check
Limit your kid's websites
time online.
Avoid
sex talk
No to cyber-
bullying
Who are in your kid’s
contact list?
Computer Ethics