狠狠撸

狠狠撸Share a Scribd company logo
‘ ’
Cybercrime is a term for any illegal activity that uses a computer as
its primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity
that uses a computer for the storage of evidence.
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
Of social media-using teens
who have witnessed online
cruelty say they have ignored
mean behavior on social media.
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
10% 40%33%
Say that at least
one person knows
their username and
password.
Admits to giving a
bank card and PIN
to a co-worker or
friend.
Worries that the
friend or co-worker
will one day take
advantage of their
trust.
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
CyberCrime - A curse of modern technogy
Don’t store login info.
Password protect
home screen.
Enable remote wipe.
Update operating
system regularly
THANKS FOR WATCHING
Let’s make the world a better place together.

More Related Content

What's hot (17)

Security Presentation
Security PresentationSecurity Presentation
Security Presentation
jpeters_securitysnapshot
?
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
?
Cyberstorm[1]
Cyberstorm[1]Cyberstorm[1]
Cyberstorm[1]
Joservaldez14
?
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
?
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
?
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
?
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
?
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
?
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
Anchalanshri Dixit
?
Cyber laws
Cyber lawsCyber laws
Cyber laws
WAQAR AHMED
?
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
Symantec
?
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
?
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
?
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
?
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
athiravm
?
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
?
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
?
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
?
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
?
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
?
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
Symantec
?
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
?
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
?
Software piracy athira
Software piracy athiraSoftware piracy athira
Software piracy athira
athiravm
?
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
?

More from Syed Ashraf Ali (7)

Portfolio of syed ashraf ali (c)
Portfolio of syed ashraf ali (c)Portfolio of syed ashraf ali (c)
Portfolio of syed ashraf ali (c)
Syed Ashraf Ali
?
Sponsorship Proposal Sample for Hoodie
Sponsorship Proposal Sample for HoodieSponsorship Proposal Sample for Hoodie
Sponsorship Proposal Sample for Hoodie
Syed Ashraf Ali
?
Basel Accords - Basel I, II, and III Advantages, limitations and contrast
Basel Accords - Basel I, II, and III Advantages, limitations and contrastBasel Accords - Basel I, II, and III Advantages, limitations and contrast
Basel Accords - Basel I, II, and III Advantages, limitations and contrast
Syed Ashraf Ali
?
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bankKey Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Syed Ashraf Ali
?
Doctor on Demand - An app business that heals
Doctor on Demand - An app business that healsDoctor on Demand - An app business that heals
Doctor on Demand - An app business that heals
Syed Ashraf Ali
?
Three Fishes that can generate Electricity
Three Fishes that can generate ElectricityThree Fishes that can generate Electricity
Three Fishes that can generate Electricity
Syed Ashraf Ali
?
Rapidly Money Investor Pitch Deck
Rapidly Money Investor Pitch DeckRapidly Money Investor Pitch Deck
Rapidly Money Investor Pitch Deck
Syed Ashraf Ali
?
Portfolio of syed ashraf ali (c)
Portfolio of syed ashraf ali (c)Portfolio of syed ashraf ali (c)
Portfolio of syed ashraf ali (c)
Syed Ashraf Ali
?
Sponsorship Proposal Sample for Hoodie
Sponsorship Proposal Sample for HoodieSponsorship Proposal Sample for Hoodie
Sponsorship Proposal Sample for Hoodie
Syed Ashraf Ali
?
Basel Accords - Basel I, II, and III Advantages, limitations and contrast
Basel Accords - Basel I, II, and III Advantages, limitations and contrastBasel Accords - Basel I, II, and III Advantages, limitations and contrast
Basel Accords - Basel I, II, and III Advantages, limitations and contrast
Syed Ashraf Ali
?
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bankKey Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Key Performance Indicator (KPI) analysis of 5 Bangladeshi commercial bank
Syed Ashraf Ali
?
Doctor on Demand - An app business that heals
Doctor on Demand - An app business that healsDoctor on Demand - An app business that heals
Doctor on Demand - An app business that heals
Syed Ashraf Ali
?
Three Fishes that can generate Electricity
Three Fishes that can generate ElectricityThree Fishes that can generate Electricity
Three Fishes that can generate Electricity
Syed Ashraf Ali
?
Rapidly Money Investor Pitch Deck
Rapidly Money Investor Pitch DeckRapidly Money Investor Pitch Deck
Rapidly Money Investor Pitch Deck
Syed Ashraf Ali
?

Recently uploaded (20)

Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
?
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
?
Importance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptxImportance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptx
ankitregmi20580419
?
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
?
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
taqyed
?
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteBusiness
?
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
taqyed
?
Advantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security SolutionsAdvantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security Solutions
Dalin Owen
?
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
?
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
?
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure DeploymentsMastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Atakan ATAK
?
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
?
The-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptxThe-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptx
febiemae2007
?
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
?
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
?
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
?
complete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guidecomplete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guide
Rana Hassan
?
Choking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptxChoking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptx
Joseph897315
?
Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999
PrayasChatterjee1
?
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
?
Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
?
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
?
Importance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptxImportance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptx
ankitregmi20580419
?
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
?
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
taqyed
?
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteBusiness
?
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
办理卡普顿大学成绩单触购买加拿大颁叠鲍成绩单文凭定制
taqyed
?
Advantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security SolutionsAdvantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security Solutions
Dalin Owen
?
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
?
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
?
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure DeploymentsMastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Atakan ATAK
?
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
?
The-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptxThe-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptx
febiemae2007
?
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
?
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
?
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
?
complete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guidecomplete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guide
Rana Hassan
?
Choking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptxChoking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptx
Joseph897315
?
Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999
PrayasChatterjee1
?
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
?

CyberCrime - A curse of modern technogy

  • 2. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. Of social media-using teens who have witnessed online cruelty say they have ignored mean behavior on social media.
  • 9. 10% 40%33% Say that at least one person knows their username and password. Admits to giving a bank card and PIN to a co-worker or friend. Worries that the friend or co-worker will one day take advantage of their trust.
  • 16. Don’t store login info. Password protect home screen. Enable remote wipe. Update operating system regularly
  • 17. THANKS FOR WATCHING Let’s make the world a better place together.