SlideShare uma empresa Scribd logo
1 de 29
CYBER CRIME: AN OVERVIEW
The Internet = A World of Opportunities Look what’s at your fingertips  ,[object Object]
Access to information and entertainment
A means to learn, meet people, and explore,[object Object]
Primary Online Risks and Threats To Families ,[object Object]
File-sharing abuses
Invasion of privacy
Disturbing content
PredatorsTo Personal Information ,[object Object]
Hoaxes
Identity theft
SpamTo Computers ,[object Object]
Worms
Trojans
Spyware,[object Object]
Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
Steps You Can Take Your computer Turn on the OS Internet firewall. Keep Windows or other OS up-to-date. Install and maintain antivirus software. Yourself Practice Internet behavior that lowers your risk. Manage your personal information carefully. Use anti-phishing and anti-spam technology built into the OS. Your family Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private.
Four Steps to Help ProtectYour Computer Turn on Windows or other OS Internet firewall Keep Windows or other OS   up-to-date Install and maintain antivirus software Install and maintain antispyware software
Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
Use Automatic Updates to Keep Software Up-to-date ,[object Object]
Automatic updates provide the best protectionwww.microsoft.com/protect
Install and Maintain Antivirus Software ,[object Object]
For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click
Back up Your Files ,[object Object]
Use a Web-based backup service,[object Object]
Only download files from Web sites you trust,[object Object]

Mais conteúdo relacionado

Mais procurados

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentationshelbyfutures
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 

Mais procurados (20)

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Protect
ProtectProtect
Protect
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Destaque

Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Sito Yelas
 
Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Sito Yelas
 
Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Clara Álvarez
 
Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Clara Álvarez
 
Paula tiene dos mamás
Paula tiene dos mamásPaula tiene dos mamás
Paula tiene dos mamásSafire
 
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasCLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasSito Yelas
 
O Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoO Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoIBMemorialJC
 
Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Clara Álvarez
 
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Aurélien Fiévez
 
Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Manuel Rodriguez
 
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Romain Fonnier
 
Palestra Igreja Esperança
Palestra Igreja EsperançaPalestra Igreja Esperança
Palestra Igreja Esperançalcsmbr
 
Geografía del mundo griego
Geografía del mundo griegoGeografía del mundo griego
Geografía del mundo griegofrancimanz
 
Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?IBMemorialJC
 

Destaque (20)

Resultados TN Infantil 2011
Resultados TN Infantil 2011Resultados TN Infantil 2011
Resultados TN Infantil 2011
 
Veni vidi twitti
Veni vidi twitti Veni vidi twitti
Veni vidi twitti
 
Repaso tema 6 y 7
Repaso tema 6 y 7Repaso tema 6 y 7
Repaso tema 6 y 7
 
Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12
 
Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5
 
El juicio de Orestes
El juicio de OrestesEl juicio de Orestes
El juicio de Orestes
 
cap1.2
cap1.2cap1.2
cap1.2
 
Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3
 
Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1
 
Paula tiene dos mamás
Paula tiene dos mamásPaula tiene dos mamás
Paula tiene dos mamás
 
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasCLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
 
O Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoO Grande Doador nos Deu Trabalho
O Grande Doador nos Deu Trabalho
 
GRIEGO I (9)
GRIEGO I (9)GRIEGO I (9)
GRIEGO I (9)
 
Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4
 
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
 
Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)
 
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
 
Palestra Igreja Esperança
Palestra Igreja EsperançaPalestra Igreja Esperança
Palestra Igreja Esperança
 
Geografía del mundo griego
Geografía del mundo griegoGeografía del mundo griego
Geografía del mundo griego
 
Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?
 

Semelhante a CYBERCRIME: AN OVERVIEW

02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 

Semelhante a CYBERCRIME: AN OVERVIEW (20)

Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
IT Security
IT SecurityIT Security
IT Security
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

CYBERCRIME: AN OVERVIEW

  • 1. CYBER CRIME: AN OVERVIEW
  • 2.
  • 3. Access to information and entertainment
  • 4.
  • 5.
  • 9.
  • 12.
  • 13. Worms
  • 15.
  • 16. Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 17. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
  • 18. Steps You Can Take Your computer Turn on the OS Internet firewall. Keep Windows or other OS up-to-date. Install and maintain antivirus software. Yourself Practice Internet behavior that lowers your risk. Manage your personal information carefully. Use anti-phishing and anti-spam technology built into the OS. Your family Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private.
  • 19. Four Steps to Help ProtectYour Computer Turn on Windows or other OS Internet firewall Keep Windows or other OS up-to-date Install and maintain antivirus software Install and maintain antispyware software
  • 20. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
  • 21.
  • 22. Automatic updates provide the best protectionwww.microsoft.com/protect
  • 23.
  • 24. For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
  • 25. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
  • 26. Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 36. Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are onlineHelpful online resources www.staysafe.org www.getnetwise.org
  • 37.
  • 38. Get to know how your kids use the Internet
  • 39. Let your kids be the teacher
  • 40. Teach kids to trust their instincts
  • 41.
  • 42. Monitor your children’s online activities
  • 43. Teach your children to report suspicious activity
  • 44.
  • 45. Do not click links in e-mail
  • 46. Treat others the way you want to be treated
  • 47. Stand up for yourself
  • 48. Respect other people’s property
  • 49.
  • 50.
  • 51. Be on the lookout for online scams
  • 52.
  • 53. Use only secure and trusted Web sites
  • 54. Make sure you are where you think you are: Web sites can be faked
  • 55. Avoid financial transactions over wireless networks
  • 56.
  • 57.
  • 58. Follow up in writing
  • 60. Place fraud alert on credit reportsGet a copy of your credit reportand ensure your account is marked “fraud alert” and “victim’s statement”
  • 61. For More Information WILLIAM WARERO MANAGER RIVOTEK KENYA LTD bwarero@rivotek.co.ke www.rivotek.co.ke

Notas do Editor

  1. Use Anti-Phishing and Anti-Spam TechnologyInternet service providers, e-mail programs, and Web browsers get better all the time. They block billions of spam e-mails daily. For example, spam filters in Microsoft Outlook, Windows Live Hotmail, and Windows Live Messenger provide strong defenses against unwanted junk e-mail, instant messages, and images.Microsoft Outlook helps reduce the amount of spam in your Inbox by filtering junk mail into a special folder. You can review the mail in this folder to make sure no legitimate mail got filtered by accident, and you can add these legitimate senders to your approved sender list to make sure they don’t get filtered again. You should delete the rest of the mail in your junk mail folder without opening it.Internet Explorer 7 includes Phishing Filter technology, which blocks access to known fraudulent sites and warns you about potentially suspicious sites. You can also use Phishing Filter to report sites that you are suspicious about, so that these sites can be reviewed.OPTIONAL For example, Microsoft is using technical innovations to help prevent spam and phishing scams from ever reaching peoples’ inboxes. Safer e-mail: Microsoft is building e-mail technology that can be used in other products and services, which stops criminals from spoofing legitimate Web sites and hiding their identities. Currently, this technology helps to protect more than 200 million Windows Live Hotmail customers worldwide against online scams.Filtered e-mail: Microsoft uses technology to identify and remove vast quantities of spam before it is ever delivered. SmartScreen filtering technology blocks more than 3.2 billion spam e-mail messages per day worldwide in Hotmail alone. In addition, Microsoft provides monthly updates to the Outlook junk mail filters, to help customers better protect and manage their inboxes from spam and other e-mail-perpetrated scams.