Cyber crime

advertisement
Cyber crime
CYBER CRIME
© 2014 wheresjenny.com
Cyber crime
Vocabulary
Defacement : An attack on a website that changes the visual appearance of the site or a
webpage
Cyber bullying : The use of electronic communication to bully a person, typically by
sending messages of threatening nature
Intellectual property : Intangible property that is the result of creativity, such as patents,
copyrights, etc
Malicious : Characterized by malice; intending or intended to do harm
Breach : An act of breaking or failing to observe a law, agreement, or code of conduct
Mitigating : Make (something bad) less severe, serious, or painful.
© 2014 wheresjenny.com
Cyber crime
What is Cyber Crime?
Cyber crime is a term that covers a broad scope of criminal activity using a computer.
Some common examples of cyber crime include identity theft, financial fraud, website
defacement, and cyber bullying. At an organizational level, cyber crime may involve the
hacking of customer databases and theft of intellectual property.
© 2014 wheresjenny.com
Cyber crime
An Example of Cyber Crime
An example of one type of cyber crime is an "account takeover." This happens when
cyber criminals compromise your computer and install malicious software, such as "key
loggers" which record the key strokes, passwords, and other private information. This in
turn allows them access the programs using your log-in credentials. Once these
criminals steal your password, they may be able to breach your online bank account.
These criminals can be anywhere in the world and may be able to transfer your money
almost immediately.
© 2014 wheresjenny.com
Cyber crime
What is Crimeware?
The software tools used in cybercrime is sometimes referred to as crimeware. Crimeware
is software that is:
• used in the commission of the criminal act
• not generally regarded as a desirable software or hardware application
• not involuntarily enabling the crime
© 2014 wheresjenny.com
Cyber crime
Different types of Cyber Crime
•
•
•
•
•
•
•
•
Hacking
Online Identity Theft
Denial-of-Service Attack
Phishing
Spamming and Email Bombing
Web Jacking
Data Diddling
Software Piracy
© 2014 wheresjenny.com
Cyber crime
What are the Effects of Cyber Crime?
The effects of a single, successful cyber attack can have far-reaching implications
including financial losses, theft of intellectual property, and loss of consumer confidence
and trust.
The overall monetary impact of cyber crime on society and government is estimated to be
billions of dollars a year.
What Should We Do?
Training and awareness are important first steps in mitigating these attacks.
All citizens, consumers, and state employees should be aware of cyber threats and the
actions they can take to protect their own information, as well as the information within
their organization.
© 2014 wheresjenny.com
Cyber crime
How to minimize the risk of becoming a cybercrime victim?
• Use strong passwords
• Secure your computer:
•
•
•
•
•
•
1. Enable your firewall.
2. Use anti-virus/malware software.
3. Block spyware attacks.
Secure your mobile devices.
Install the latest operating system updates.
Protect your data.
Secure your wireless network
Protect your e-identity
Avoid being scammed.
© 2014 wheresjenny.com
Cyber crime
Quiz
1. Illegal Interception, Illegal Access, Data Interference, and System Interference are all a
part of Cybercrime.
A. True B. False
2. Computer hacking is the practice of modifying computer software and hardware to
accomplish a goal outside of the creator's original purpose.
A. Yes B. No
3. Identity Theft is not a growing problem in the United States.
A. True B. False
4. Kids that have gone missing had the consent of their parents.
A. Yes B. No
5. Spam is junk mail, sent indiscriminately for the purpose of selling goods or services and
can also include punishing attempts and virus infections.
A. True B. False
© 2014 wheresjenny.com
Cyber crime
6. Cyberstalking can only be done online.
A. Yes B. No
7. There is only one way to hack into someone's computer and their data.
A. True B .False
8. Common cases of cybercrime include fraud, misuse of devices, hacking, identity theft,
and cyberstalking.
A. Yes B. No
9. When preventing your child to go missing, you have to know what social networks your
child is in only.
A. True B .False
10. Cyberstalking and harassment is most commonly done while on a computer, but it can
also happen in real life.
A. Yes B. No
© 2014 wheresjenny.com
Download