SlideShare a Scribd company logo
1 of 29
CYBER CRIME
Grade 10 students 
ICT INTEGRATED INTO LEADERSHIP AND 
SERVICE 
17th October, 2014. 
Surefoot International School 
Calabar, Nigeria.
Cybercrime is a term for any illegal activity that uses a 
computer as its primary means of commission. The U.S. 
Department of Justice expands the definition of 
cybercrime to include any illegal activity that uses a 
computer for the storage of evidence.
Types of cyber crimes 
1. HACKING
This is the process of gaining unauthorized 
access into a computer system or data belonging 
to someone else. 
Types range from outside parties who hack into a 
computer network to phishing programs which 
give users a false sense of security, prompting 
them to divulge sensitive information.
2. ELECTRONIC FUNDS TRANSFER 
FRAUD
Electronic funds transfer systems have begun to 
be exploited, and so has the risk that such 
transactions may be intercepted and diverted. 
Valid credit card numbers can be intercepted 
electronically, as well as physically; the digital 
information stored on a card can be 
counterfeited.
DISSEMINATION OF 
OFFENSIVE 
MATERIALS
There are many others like: 
THEFT OF TELECOMMUNICATIONS SERVICES 
COMMUNICATIONS IN FURTHERANCE OF 
CRIMINAL CONSPIRACIES 
TELECOMMUNICATIONS PIRACY 
ELECTRONIC MONEY LAUNDERING AND TAX 
EVASION 
E.T.C
EFFECTS OF CYBERCRIME
THE EFFECTS 
The effects may vary from: 
Loss Of Revenue 
Wasted Time 
Damaged Reputations 
Reproduced Productivity
LOSS OF REVENUE 
One of the main effects of cyber 
crime on a company is a loss of 
revenue. This loss can be caused by 
an outside party who obtains 
sensitive financial information, using 
it to withdraw funds from an 
organization. It can also occur when 
a business's e-commerce site
WASTED TIME 
Another major effect or 
consequence of cyber crime is the 
time that is wasted when an IT 
personnel devotes great portions of 
their day handling such incidences. 
Rather than working on productive 
measures for an organization, many 
IT staff members spend a large
DAMAGED 
REPUTATIONS 
In cases where customer records 
are compromised by a security 
breach associated with cyber crime, 
a company's reputation can take a 
major hit. Customers whose credit 
cards or other financial data 
become intercepted by hackers or 
other infiltrators
REDUCED PRODUCTIVITY 
Due to the measures that many 
companies must implement to 
stabilize cyber crime, there is often 
a negative effect on employees' 
productivity. This is due to security 
measures, employees must enter 
more passwords and perform other 
time-consuming acts in order to do
So far, we have seen that, 
cybercrimes are done through 
computer networks, which enable 
hackers to get ones personal 
information (hacking) and use it for 
illegal activities. 
Let’s have a look at how to 
prevent cybercrimes.
PREVENTION 
Secure your computer 
•Activate your firewall 
•Use anti-virus software 
•Block spyware attacks 
•Keep your system updated 
 Protect your E-identity
CALL FOR HELP 
If you are a victim, if you 
encounter illegal Internet content 
(e.g. child exploitation) or if you 
suspect a computer crime, identity 
theft or a commercial scam, report 
this to your local police.
EDUCATION 
Hackers aren’t the only ones who 
can gain power from information. 
By educating yourself about the 
types of scams that exist on the 
Internet and how to avert them, 
you are putting yourself one step 
ahead of the cybercriminals.
CLICK WITH CAUTION 
•When you’re on internet, be 
careful not to click on any link in 
messages from people you don’t 
know. Even if the message is 
from someone you know, be 
cautious. Some viruses replicate 
and spread through email, so look 
for information that indicates
PRACTICE SAFE SHOPPING 
Be cautious when 
shopping at a site 
that you’ve never 
visited before and do 
a little investigation 
before you enter your 
payment information.
BE CAREFUL ON WI-FI 
Laptops and phones both 
‘remember’ Wi-Fi networks which 
they have ‘used’ – so hackers can 
use this to break in. Avoid 
conducting financial or corporate 
transactions on public networks. 
Also, Wi-Fi (wireless) networks at
USE STRONG PASSWORDS 
Although it may be easier for you 
to remember short passwords, 
strong passwords can go a long way 
in helping secure your information, 
so choose a password that consists 
of a combination of letters, 
numbers and special characters and
COMMANDMENTS ON 
CYBERCRIME 
•I will not share personal data with whomsoever it may be, 
unless known. 
•I will never meet someone in person with whom i come across 
online. 
•I will not post or download inappropriate files on the internet. 
•I will not share my password with anyone.
COMMANDMENTS ON 
CYBERCRIME 
•I will not do any bank transactions on public Wi-Fi as it may 
subject to banking fraud. 
•I will not click on any unknown links as they may contain 
harmful viruses.
THE 
END 
Presented By 
Chaitali 
Ebito 
Tega 
Emaediong 
Oscar 
ICT Coordinator - Mohan Robert 
Homeroom Teacher - Emmanuel Isong 
ICT Support - Caleb

More Related Content

What's hot (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Viewers also liked

Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary Schoolsbrokvam
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And PunishmentShabbir Terai
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011Mel Tan
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary EducationRex Galos
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally ExcellentLeslie Bradshaw
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (13)

Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary School
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And Punishment
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Crime

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 

Similar to Cyber Crime (20)

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Information security
Information securityInformation security
Information security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Cyber Crime

  • 2. Grade 10 students ICT INTEGRATED INTO LEADERSHIP AND SERVICE 17th October, 2014. Surefoot International School Calabar, Nigeria.
  • 3.
  • 4. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. Types of cyber crimes 1. HACKING
  • 6. This is the process of gaining unauthorized access into a computer system or data belonging to someone else. Types range from outside parties who hack into a computer network to phishing programs which give users a false sense of security, prompting them to divulge sensitive information.
  • 7. 2. ELECTRONIC FUNDS TRANSFER FRAUD
  • 8. Electronic funds transfer systems have begun to be exploited, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.
  • 10. There are many others like: THEFT OF TELECOMMUNICATIONS SERVICES COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES TELECOMMUNICATIONS PIRACY ELECTRONIC MONEY LAUNDERING AND TAX EVASION E.T.C
  • 11.
  • 13. THE EFFECTS The effects may vary from: Loss Of Revenue Wasted Time Damaged Reputations Reproduced Productivity
  • 14. LOSS OF REVENUE One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site
  • 15. WASTED TIME Another major effect or consequence of cyber crime is the time that is wasted when an IT personnel devotes great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large
  • 16. DAMAGED REPUTATIONS In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators
  • 17. REDUCED PRODUCTIVITY Due to the measures that many companies must implement to stabilize cyber crime, there is often a negative effect on employees' productivity. This is due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do
  • 18. So far, we have seen that, cybercrimes are done through computer networks, which enable hackers to get ones personal information (hacking) and use it for illegal activities. Let’s have a look at how to prevent cybercrimes.
  • 19. PREVENTION Secure your computer •Activate your firewall •Use anti-virus software •Block spyware attacks •Keep your system updated  Protect your E-identity
  • 20. CALL FOR HELP If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police.
  • 21. EDUCATION Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals.
  • 22. CLICK WITH CAUTION •When you’re on internet, be careful not to click on any link in messages from people you don’t know. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates
  • 23. PRACTICE SAFE SHOPPING Be cautious when shopping at a site that you’ve never visited before and do a little investigation before you enter your payment information.
  • 24. BE CAREFUL ON WI-FI Laptops and phones both ‘remember’ Wi-Fi networks which they have ‘used’ – so hackers can use this to break in. Avoid conducting financial or corporate transactions on public networks. Also, Wi-Fi (wireless) networks at
  • 25. USE STRONG PASSWORDS Although it may be easier for you to remember short passwords, strong passwords can go a long way in helping secure your information, so choose a password that consists of a combination of letters, numbers and special characters and
  • 26.
  • 27. COMMANDMENTS ON CYBERCRIME •I will not share personal data with whomsoever it may be, unless known. •I will never meet someone in person with whom i come across online. •I will not post or download inappropriate files on the internet. •I will not share my password with anyone.
  • 28. COMMANDMENTS ON CYBERCRIME •I will not do any bank transactions on public Wi-Fi as it may subject to banking fraud. •I will not click on any unknown links as they may contain harmful viruses.
  • 29. THE END Presented By Chaitali Ebito Tega Emaediong Oscar ICT Coordinator - Mohan Robert Homeroom Teacher - Emmanuel Isong ICT Support - Caleb

Editor's Notes

  1. Also look at the address bar to see if the site starts with “https://” instead of “http://” as this is another way to see if the site uses encryption.
  2. 10 characters long