"Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“
2. Cyber Crime
"Offences that are committed against individuals or
groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or
cause physical or mental harm to the victim directly
or indirectly, using modern telecommunication
networks such as Internet (Chat rooms, emails,
notice boards and groups) and mobile phones
(SMS/MMS)“
5. Hacking
Definition Protection
Hacking is unauthorized use of Make your passwords long and
complicated, and with a good mix of
computer and network letters and numbers, as well as utilizing
resources. case-sensitive letters. Don't use anything
familiar, such as your birthday, your
The activity of breaking into a children's names or anything like that. If a
computer system to gain an hacker wants to attempt to break into your
unauthorized access is known as email accounts, at least make him work
hacking. The act of defeating the for it.
Don't ever allow your browser to
security capabilities of a computer
remember your passwords. True, it may
system in order to obtain an illegal
be a bit of an inconvenience to enter your
access to the information stored on
password every time you log in.
the computer system is called hacking. Activate Firewall
6. Phishing
(fishing)
Disguising as a trustworthy source
Phishing is the act of attempting to
acquire sensitive information like
usernames, passwords and credit card
details by disguising as a trustworthy
source. Phishing is carried out through
emails or by luring the users to enter
personal information through fake
websites. Criminals often use websites
that have a look and feel of some
popular website, which makes the users
feel safe to enter their details there.
7.
8. Phishing
Phishing Protection
• The most powerful weapon against phishing is common sense and
the following rules that every user should oblige to.
• If you are not a customer of the site delete the email immediatly.
Don´t click on the link or reply.
• If you are a customer and you are not sure if the email is legit do
one of the following:
• Contact the institute by phone or contact at the official website ( do
not use the email link of course) and ask if the mail is official.
• Instead of using the link provided open the website by typing in the
official link there. The site should have news about the email on their
starting page. (most of the time). If not, use 2a to verify the email.
9. Pharming
DNS Poisoning
Pharming in Simple Steps:
Hacker creates a fake website which appears
similar to the original website.
Hacker poisons the DNS servers thus domain
names are resolved into fake IP address.
User types the URL of the original website in
the browser.
The DNS server directs User to the fake
website designed by hacker.
User not knowing that it is a fake website,
shares his confidential information such as
login, password... etc.
Hacker gets the user confidential information
from his fake web site and uses it to access
the original website.
Hacker exploits user's confidential information
to his liking.
10. Pharmin
DNS
g
Poisoning
Pharming in Simple Steps:
Hacker creates a fake website which appears
similar to the original website.
Hacker poisons the DNS servers thus domain
names are resolved into fake IP address.
User types the URL of the original website in
the browser.
The DNS server directs User to the fake
website designed by hacker.
User not knowing that it is a fake website,
shares his confidential information such as
login, password... etc.
Hacker gets the user confidential information
from his fake web site and uses it to access
the original website.
Hacker exploits user's confidential information
to his liking.
11. Pharming
Protection from Pharming
1 Check the URL of 2 Use a trusted, 3 Check the
any site that asks legitimate certificate. It
you to provide Internet Service takes just a few
personal
Provider. seconds to tell if
information. Make
sure your session Rigorous a site you land
begins at the security at the on is legitimate.
known authentic ISP level is your Block suspicious
address of the site, first line of Websites
with no additional defense against automatically
characters pharming.
appended to it.
12. Internet Business Scams
Dear Friend, as you read this, I don't want you to feel sorry for me, because, I
believe everyone will die someday. My name is Mr Adada Muhammadu, a Crude
Oil merchant in Nigeria and I have been diagnosed with Esophageal cancer. It
has defied all forms of medical treatment, and right now I have only about a few
months to live, according to medical experts. I want God to be merciful to me
and accept my soul so, I have decided to give alms to charity organizations, as I
want this to be one of the last good deeds I do on earth. So far, I have
distributed money to some charity organizations in Austria, Cameroon, Liberia,
Algeria and Malaysia. Now that my health has deteriorated badly, I cannot do it
myself anymore. The last of my money which no one knows of is the huge cash
deposit of Eighty million dollars $80,000,000 that I have with a finance/Security
Company abroad. I will want you to help me collect this deposit and dispatched
it to charity organizations. I have set aside 20% for you and for your time. God
be with you. ~ Mr Adada Muhammadu"
13. Most Common Business Scams
First and foremost, let me make it clear. There is some
Get Paid Programs good news for all you get paid program enthusiasts. Not all
get paid programs are fake but 99%. They Cheat by
demanding a subscription fee or a membership fee
Once again, a majority of these programs are downright fake. Most of
them promise home based business opportunities and jobs involving
Work From Home Scams typing, data entry, etc. However, all of them vanish from existence
once they've managed to lay their hands on the 'small' subscription
fee that you pay them.
It's not what it sounds like. The banks haven't started getting into
Internet crime (and thank God for that!). It's just that some cunning
Bank Scams:
fraudsters create duplicate (read FAKE) websites which are complete
with the bank's logo, hyperlink, etc. Then they send fake emails on
behalf of the 'bank', asking you to visit the bank website (obviously
the fake one) and enter your account details as well as other
sensitive information.