Publicité

Power point cybercrime

12 Mar 2015
Publicité

Contenu connexe

Publicité

Power point cybercrime

  1. CYBERCRIME  Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  2. TYPES OF CYBERCRIME (I)
  3. TYPES OF CYBERCRIME (II)
  4. HACKING  The process to attempting to gain or succesfully gaining, unauthorized access to computer resources.
  5. WHO IS A HACKER?  In the computer security context,a hacker is someone who seeks and exploits weaknesses in a computer system or a computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  6. TYPES OF HACKING  Website hacking  Network hacking  Ethical hacking  Email hacking  Password hacking  Online banking hacking  Computer hacking
  7. IDENTITY THEFT  Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation and can take time, money, and patience to resolve.
  8. SPECIFIC TYPES OF IDENTITY THEFT  Tax-Related Identity Theft  Child Identity Theft  Medical Identity Theft
  9. HOW TO PREVENT IDENTITY THEFT
  10. MALICIOUS SOFTWARE  Malicious software, commonly known as malware, is any software designed to cause harm to a computer and user.
  11. TYPES OF MALWARE  Worms  Viruses  Adware  Trojans  Spyware  Rootkits
  12. HOW TO AVOID MALWARE?  Anti-malware  Anti-virus  Firewall
  13. Cyberstalking  Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.  It may include:  false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass.
  14. STATE CYBERSTALKING AND CYBERHARASSMENT LAWS  States have enacted "cyberstalking" or "cyberharassment" laws or have laws that explicitly include electronic forms of communication within more traditional stalking or harassment laws. This chart identifies state laws that include specific references to electronic communication.
  15. THEFT  theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property.
  16.  A few years ago people saw the huge potential of the internet for commiting dishonest acts as child abuse and soliciting.  Child abuse is the physical, sexual or emotional maltreatment or neglect of a child or children  Online predators are people who commit child sexual abuse that begins or takes place on the Internet. Child abuse and soliciting
  17.  Internet-initiated sex crimes against minors involve deceit and violence, and begin with adult strangers known as internet predators communicating with children and young teenagers over the Internet and sometimes then meeting face to face.  Online predators use chat rooms, instant messaging, Internet forums, social networking sites, cell phones, and even video game consoles  Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. How does it work? (I)
  18.  Online predators are a very important source of child pornography.  A longitudinal study of 341 convicted child molesters in America found that pornography's use correlated significantly with their rate of sexually re-offending. The study says that watching child pornography can increase recidivism risk for all groups of child molesters. How does it work? (II)
  19.  In order to prevent child abuse you should:  Explain your children the safety rules of the internet.  Keep your home computer out in the open.  Set up an internet protection program on the computers your children use.  Tell your children not to give out passwords, even to a good friend. How to prevent online child abuse and soliciting?
  20. BIBLIOGRAPHY  http://www.techopedia.com/definition/4015/malicious-software-malware  http://es.slideshare.net/sairanisakoji/hacking-its-types  www.wikipedia.org/wiki/hacker  www.wikipedia.org/wiki/hacking
  21. NOMBRES:  Ángel Giral Arruego  Javier Corbalán Monserrate  Víctor Velasco  Volodhymir Khymera
Publicité