際際滷

際際滷Share a Scribd company logo
CYBERCRIME
Cybercrime is a term for any illegal activity
that uses a computer as its primary means of
commission. It is a criminal activity.
- Hacking:This is a type of crime wherein a persons computer is broken into
so that his personal or sensitive information can be accessed.
-Theft:This crime occurs when a person violates copyrights and downloads
music, movies, games and software.
- Cyber stalking:This is a kind of online harassment wherein the victim is
subjected to a barrage of online messages and emails.Typically, these
stalkers know their victims and they use the Internet to stalk.
- Child soliciting and abuse:This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the purpose of child
pornography.
- Identity theft:This has become a major problem with people using the
Internet for cash transactions and banking services.
Cyberbullying is bullying that takes place using
electronic technology. Electronic technology
includes devices and equipment such as cell phones,
computers, and tablets as well as communication
tools including social media sites, text messages,
chat, and websites.
Changes in their habits:
-Less use of mobile phones, computer etc
-Absence to school or high school
-Changes in their leisures activities
Mood changes:
-Fear to go out home
-Agressives reactions
-Mood changes in general: sadness, apathy, indifference etc
which were unusual before.
Physical changes:
-Stooped shoulders
-Stomach ache and headache
-Lack of eye contact
-Loss or wieght increase
What parents can do:
-Be aware of what your children are doing and get involved.
- Have a source of communication always open.
-Report any incident to the Internet Service Provider.
-Look for signs if your child is being cyber bullied.
What teachers can do:
-Integrate anti-cyber bullying programs into classroom.
-Educate other teachers about cyber bullying
It is also important:
Do not give out information online
Tell someone if you feel uncomfortable
Do not give out information onlineDo not give out information online
A cyberbully is a predator that can
wait patiently, connected to the network, participate
in chat, forums until it enters
into contact with someone
who seems likely to annoy
A cyber victim is a victim of various crimes
committed via Internet.There is not a psychological
profile that predisposes a person
to be bullied.This means that :
Anyone can be a victim
Victims are not always weak or sick people from a
psychological point of view
Megan Meier Erin Gallagher
13 years old 13 years old
AmandaTodd was 15 years old when she
commited suicide. On the right
we can see herlast letter to her elder sister.
She recorded a video
in which she explained
her story
https://www.youtube.com/watch?v=vOHXGNx-E7E

More Related Content

What's hot (20)

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
Digital law
Digital lawDigital law
Digital law
Alieyn_
Phishing
PhishingPhishing
Phishing
anjalika sinha
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Qazi Anwar
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
Digital law
Digital lawDigital law
Digital law
Alieyn_
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Qazi Anwar
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali

Similar to Cybercrime (20)

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
Diocese of Metuchen Office of Schools
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
Desiree Caskey
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
ReyLouieSedigo1
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
Bullyvention
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdf
PavelVtek3
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
悋悋惡惠慍悋慍 悋悋惠惘 悋惠惺悋 惺 悋悋惡惠慍悋慍 悋悋惠惘(1).pptx
悋悋惡惠慍悋慍 悋悋惠惘 悋惠惺悋 惺 悋悋惡惠慍悋慍 悋悋惠惘(1).pptx悋悋惡惠慍悋慍 悋悋惠惘 悋惠惺悋 惺 悋悋惡惠慍悋慍 悋悋惠惘(1).pptx
悋悋惡惠慍悋慍 悋悋惠惘 悋惠惺悋 惺 悋悋惡惠慍悋慍 悋悋惠惘(1).pptx
AzammmAlqadhii
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Catal牒na V叩squez Pere牒ra
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
cyberbullyingisreal
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
Reuben Millare
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
columbiahighschoollibrary
Internet Safety
Internet SafetyInternet Safety
Internet Safety
columbiahighschoollibrary

Recently uploaded (14)

Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1
Building a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdfBuilding a Multiplatform SDKMAN in JavaFX.pdf
Building a Multiplatform SDKMAN in JavaFX.pdf
Jago de Vreede
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87APNIC Update, presented by Joyce Chen at APTLD 87
APNIC Update, presented by Joyce Chen at APTLD 87
APNIC
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
RIRs and the Next Chapter of Internet Growth - from IPv4 to IPv6
APNIC
What Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdfWhat Is the Difference Between the Internet and WAN.pdf
What Is the Difference Between the Internet and WAN.pdf
Internet Bundle Now
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation3d animation3d animation3d animation3d animation
3d animation3d animation3d animation3d animation
animationkeemo21
10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era10 Critical Skills Kids Need in the AI Era
10 Critical Skills Kids Need in the AI Era
RachelDines1

Cybercrime

  • 2. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. It is a criminal activity.
  • 3. - Hacking:This is a type of crime wherein a persons computer is broken into so that his personal or sensitive information can be accessed. -Theft:This crime occurs when a person violates copyrights and downloads music, movies, games and software. - Cyber stalking:This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.Typically, these stalkers know their victims and they use the Internet to stalk. - Child soliciting and abuse:This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. - Identity theft:This has become a major problem with people using the Internet for cash transactions and banking services.
  • 4. Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.
  • 5. Changes in their habits: -Less use of mobile phones, computer etc -Absence to school or high school -Changes in their leisures activities Mood changes: -Fear to go out home -Agressives reactions -Mood changes in general: sadness, apathy, indifference etc which were unusual before.
  • 6. Physical changes: -Stooped shoulders -Stomach ache and headache -Lack of eye contact -Loss or wieght increase
  • 7. What parents can do: -Be aware of what your children are doing and get involved. - Have a source of communication always open. -Report any incident to the Internet Service Provider. -Look for signs if your child is being cyber bullied. What teachers can do: -Integrate anti-cyber bullying programs into classroom. -Educate other teachers about cyber bullying It is also important: Do not give out information online Tell someone if you feel uncomfortable Do not give out information onlineDo not give out information online
  • 8. A cyberbully is a predator that can wait patiently, connected to the network, participate in chat, forums until it enters into contact with someone who seems likely to annoy
  • 9. A cyber victim is a victim of various crimes committed via Internet.There is not a psychological profile that predisposes a person to be bullied.This means that : Anyone can be a victim Victims are not always weak or sick people from a psychological point of view
  • 10. Megan Meier Erin Gallagher 13 years old 13 years old
  • 11. AmandaTodd was 15 years old when she commited suicide. On the right we can see herlast letter to her elder sister. She recorded a video in which she explained her story https://www.youtube.com/watch?v=vOHXGNx-E7E