ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
PLEASE TAKE OUT YOUR
DEVICES AND ACCESS
KAHOOT.IT
THE DANGERS OF
COMPUTER CRIME
WHAT IS COMPUTER CRIME
• ALTERNATIVELY REFERRED TO AS CYBER CRIME, E-CRIME, ELECTRONIC CRIME,
OR HI-TECH CRIME. COMPUTER CRIMES AN ACT PERFORMED BY A
KNOWLEDGEABLE COMPUTER USER, SOMETIMES REFERRED TO AS
A HACKER THAT ILLEGALLY BROWSES OR STEALS A COMPANY'S OR INDIVIDUAL'S
PRIVATE INFORMATION. IN SOME CASES, THIS PERSON OR GROUP OF
INDIVIDUALS MAY BE MALICIOUS AND DESTROY OR OTHERWISE CORRUPT THE
COMPUTER OR DATA FILES.
COMPUTER CRIME
• IT CAN BE SEEN AS TWO WAYS, WHERE A COMPUTER SYSTEMS IS THE TARGET OF
THE CRIME (E.G HACKING)
• WHERE COMPUTER TECHNOLOGY IS USED TO ENABLE OR COMMIT CRIME
TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
PHISHING
THE FRAUDULENT PRACTICE OF
SENDING EMAILS PURPORTING TO
BE FROM REPUTABLE COMPANIES IN
ORDER TO INDUCE INDIVIDUALS TO
REVEAL PERSONAL INFORMATION,
SUCH AS PASSWORDS AND CREDIT
CARD NUMBERS.
BOTS
A ROBOT THAT HAS BEEN
COMPROMISED (OR INFECTED) AND
CAN BE CONTROLLED REMOTELY
WHEN IT IS ON AND CONNECT TO
THE INTERNAT .
A BOT CAN ALSO BE CALLED A
ZOMBIE.
COMPUTER VIRUS
A COMPUTER VIRUS IS MALWARE
THAT IS WRITTEN TO DISRUPT THE
NORMAL FUNCTIONING OF A
PERSONS COMPUTER, WITH OUT
THEIR KNOWLEDGE OR CONSENT.
IT CAN BE USED TO TURN YOUR
COMPUTER INTO A BOT
TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
Spoofing
COMPUTER
WORM
SPYWARE
KEY
BLOG
GER
TROJA
N
CATERGORIES OF COMPUTER CRIME
HARRASMENT
WHEN YOU ARE CONINOUSLY
BOTHERED WITH MASSEGES OR
DATA THAT YOU DO NOT WANT TO
RECEIVE.
OR DATA WHICH SPREADS FALSE OR
POTENTIALLY HARMFUL
INFORMATION ABOUT YOU TO
OTHERS
CYBER ATTACKS
IS AN ATTACK TO THE
INFRUSTRUCTURE OF THE WEB
ITSELF. E.G.
*BUSINESS CYBER ATTACKS THAT
CAUSES PROBLEMS WITH
CONDUCTING BUSINESS ONLINE.
*WEBSITE CYBER ATTACKS.
CATERGORIES OF COMPUTER CRIME
COMPUTERS AND THEFT
BANDWIDTH
DEFINED AS THE AMOUNT OF
DATA THAT CAN BE TRANSMITTED
IN A FIXED AMOUNT OF TIME.
IDENTITY THEFT
THE FRAUDULENT ACQUISITION
AND USE OF A PERSON'S PRIVATE
IDENTIFYING INFORMATION,
USUALLY FOR FINANCIAL GAIN.
MONEY
MONEY IS USUALLY STOLEN BY
USING ONE OF THE METHODS WE
HAVE DESCRIBED, WHICH IS TO GET
CONFIDENTIAL INFORMATION THAT
ALLOWS ACCESS TO BANKS
ACCOUNTS OF A BUSINESS OR AN
INDIVIDUAL.
COPY RIGHTED
MATERIAL
PROTECTION FROM COMPUTER CRIME
ASSUME NOTHING
DON’T ASSUME YOU ARE SAFE AND
PROTECTED AND DON’T ASSUME
THAT THE STRANGER SENDING
YOU THE EMAIL IS WHO OR WHAT
THEY SAY THEY ARE
BELIEVE IN NO ONE
CHECK UP ON THE PEOPLE YOU ARE
INTERACTING WITH, FOR EXAMPLE,
IS THE PERSON ASKING FOR YOUR
PASSWORD TO FIX YOUR
COMPUTER IS AN ICT/IT SPECIALIST
OR SOMEONE ELSE
CHECK EVERYTHING
BAD SPELLING AND GRAMMER AND
INCORRECT WESITES URLS ARE
THINGS THAT YOU CAN CHECK TO
DECIDE IF AN EMAIL TO A WEBSITE
IS LEGITE OR BELIEVABLE
A
B
C
SOFTWARE YOU NEED TO HELP YOU PROTECT YOUR
COMPUTER
ANTI-VIRUS SOFTWARE IS A
PROGRAM OR SET OF PROGRAMS
THAT ARE DESIGNED TO PREVENT,
SEARCH FOR, DETECT, AND
REMOVE SOFTWARE VIRUSES, AND
OTHER MALICIOUS SOFTWARE LIKE
WORMS, TROJANS, ADWARE, AND
MORE.
IS A NETWORK SECURITY SYSTEM
DESIGNED TO PREVENT
UNAUTHORIZED ACCESS TO OR
FROM A PRIVATE
NETWORK. FIREWALLS CAN BE
IMPLEMENTED AS BOTH HARDWARE
ANDSOFTWARE, OR A
COMBINATION OF BOTH
TYPE OF SOFTWARE THAT IS
DESIGNED TO DETECT AND REMOVE
UNWANTED SPYWARE
PROGRAMS. SPYWARE IS A TYPE OF
MALWARE THAT IS INSTALLED ON A
COMPUTER WITHOUT THE USER'S
KNOWLEDGE IN ORDER TO COLLECT
INFORMATION ABOUT THEM.
ANTI-VIRUS SOFTWARE FIREWALL SOFTWARE ANTI-SPY SOFTWARE

More Related Content

Dangers of Computer devices

  • 1. PLEASE TAKE OUT YOUR DEVICES AND ACCESS KAHOOT.IT
  • 3. WHAT IS COMPUTER CRIME • ALTERNATIVELY REFERRED TO AS CYBER CRIME, E-CRIME, ELECTRONIC CRIME, OR HI-TECH CRIME. COMPUTER CRIMES AN ACT PERFORMED BY A KNOWLEDGEABLE COMPUTER USER, SOMETIMES REFERRED TO AS A HACKER THAT ILLEGALLY BROWSES OR STEALS A COMPANY'S OR INDIVIDUAL'S PRIVATE INFORMATION. IN SOME CASES, THIS PERSON OR GROUP OF INDIVIDUALS MAY BE MALICIOUS AND DESTROY OR OTHERWISE CORRUPT THE COMPUTER OR DATA FILES.
  • 4. COMPUTER CRIME • IT CAN BE SEEN AS TWO WAYS, WHERE A COMPUTER SYSTEMS IS THE TARGET OF THE CRIME (E.G HACKING) • WHERE COMPUTER TECHNOLOGY IS USED TO ENABLE OR COMMIT CRIME
  • 5. TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIME PHISHING THE FRAUDULENT PRACTICE OF SENDING EMAILS PURPORTING TO BE FROM REPUTABLE COMPANIES IN ORDER TO INDUCE INDIVIDUALS TO REVEAL PERSONAL INFORMATION, SUCH AS PASSWORDS AND CREDIT CARD NUMBERS. BOTS A ROBOT THAT HAS BEEN COMPROMISED (OR INFECTED) AND CAN BE CONTROLLED REMOTELY WHEN IT IS ON AND CONNECT TO THE INTERNAT . A BOT CAN ALSO BE CALLED A ZOMBIE. COMPUTER VIRUS A COMPUTER VIRUS IS MALWARE THAT IS WRITTEN TO DISRUPT THE NORMAL FUNCTIONING OF A PERSONS COMPUTER, WITH OUT THEIR KNOWLEDGE OR CONSENT. IT CAN BE USED TO TURN YOUR COMPUTER INTO A BOT
  • 6. TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIME Spoofing COMPUTER WORM SPYWARE KEY BLOG GER TROJA N
  • 7. CATERGORIES OF COMPUTER CRIME HARRASMENT WHEN YOU ARE CONINOUSLY BOTHERED WITH MASSEGES OR DATA THAT YOU DO NOT WANT TO RECEIVE. OR DATA WHICH SPREADS FALSE OR POTENTIALLY HARMFUL INFORMATION ABOUT YOU TO OTHERS CYBER ATTACKS IS AN ATTACK TO THE INFRUSTRUCTURE OF THE WEB ITSELF. E.G. *BUSINESS CYBER ATTACKS THAT CAUSES PROBLEMS WITH CONDUCTING BUSINESS ONLINE. *WEBSITE CYBER ATTACKS.
  • 9. COMPUTERS AND THEFT BANDWIDTH DEFINED AS THE AMOUNT OF DATA THAT CAN BE TRANSMITTED IN A FIXED AMOUNT OF TIME. IDENTITY THEFT THE FRAUDULENT ACQUISITION AND USE OF A PERSON'S PRIVATE IDENTIFYING INFORMATION, USUALLY FOR FINANCIAL GAIN. MONEY MONEY IS USUALLY STOLEN BY USING ONE OF THE METHODS WE HAVE DESCRIBED, WHICH IS TO GET CONFIDENTIAL INFORMATION THAT ALLOWS ACCESS TO BANKS ACCOUNTS OF A BUSINESS OR AN INDIVIDUAL. COPY RIGHTED MATERIAL
  • 10. PROTECTION FROM COMPUTER CRIME ASSUME NOTHING DON’T ASSUME YOU ARE SAFE AND PROTECTED AND DON’T ASSUME THAT THE STRANGER SENDING YOU THE EMAIL IS WHO OR WHAT THEY SAY THEY ARE BELIEVE IN NO ONE CHECK UP ON THE PEOPLE YOU ARE INTERACTING WITH, FOR EXAMPLE, IS THE PERSON ASKING FOR YOUR PASSWORD TO FIX YOUR COMPUTER IS AN ICT/IT SPECIALIST OR SOMEONE ELSE CHECK EVERYTHING BAD SPELLING AND GRAMMER AND INCORRECT WESITES URLS ARE THINGS THAT YOU CAN CHECK TO DECIDE IF AN EMAIL TO A WEBSITE IS LEGITE OR BELIEVABLE A B C
  • 11. SOFTWARE YOU NEED TO HELP YOU PROTECT YOUR COMPUTER ANTI-VIRUS SOFTWARE IS A PROGRAM OR SET OF PROGRAMS THAT ARE DESIGNED TO PREVENT, SEARCH FOR, DETECT, AND REMOVE SOFTWARE VIRUSES, AND OTHER MALICIOUS SOFTWARE LIKE WORMS, TROJANS, ADWARE, AND MORE. IS A NETWORK SECURITY SYSTEM DESIGNED TO PREVENT UNAUTHORIZED ACCESS TO OR FROM A PRIVATE NETWORK. FIREWALLS CAN BE IMPLEMENTED AS BOTH HARDWARE ANDSOFTWARE, OR A COMBINATION OF BOTH TYPE OF SOFTWARE THAT IS DESIGNED TO DETECT AND REMOVE UNWANTED SPYWARE PROGRAMS. SPYWARE IS A TYPE OF MALWARE THAT IS INSTALLED ON A COMPUTER WITHOUT THE USER'S KNOWLEDGE IN ORDER TO COLLECT INFORMATION ABOUT THEM. ANTI-VIRUS SOFTWARE FIREWALL SOFTWARE ANTI-SPY SOFTWARE