• Like
  • Save
IS201 Internet Crime and Safety
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

IS201 Internet Crime and Safety


For academic purposes only. …

For academic purposes only.
Sources of information are compiled and indicated in the Reference section of the presentation. Images or pictures are obtained from Google search.

Published in Education , Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. A Computer Ethics Seminar Presented by: Jennifer June JaenUniversity of the Philippines Open University Computer Ethics
  • 2. Internet Crime and Safety Sept. 9, 2012 Cebu City Computer Ethics
  • 3. Objectives of the Seminar• To be able to identify vulnerabilities in the use of theInternet such as in social networking sites, e-commerce, and e-mail• To be able to identify, detect, and protect from certaintypes of cyber-attacks such as cyber-bullying, unethicalhacking, and identity theft• To identify the role of privacy and freedom ofexpression in the proliferation of Internet crime such aspornography Computer Ethics
  • 4. It is a crime committed using a computer orthe Internet by an individual or organization. Computer Ethics
  • 5. Perpetrators of Cybercrime• Hackers Test limit of system and gain publicity• Crackers Steal data, corrupt systems, create problems Computer Ethics
  • 6. Perpetrators of Cybercrime• Insider Corrupt systems, make money• Industrial spy Capture trade secrets, for competition Computer Ethics
  • 7. Perpetrators of Cybercrime• Cybercriminal Make money• Cyber-terrorist Destroy key infrastructure Computer Ethics
  • 8. VirusThese are malicious software that arecreated by cybercriminals who use theinternet to perpetrate their crimes Computer Ethics
  • 9. SpamSpam is the abuse of electronicmessaging systems to indiscriminatelysend unsolicited bulk messages Computer Ethics
  • 10. ScamComputer Ethics
  • 11. Scam examples Computer Ethics
  • 12. Phishing It is an attempt to acquire informationsuch as usernames, passwords, creditcard details by masquerading as alegitimate business. Computer Ethics
  • 13. PhishingThe senders are phishing for yourpersonal information so they canuse it to commit fraud. Computer Ethics
  • 14. Phising Example Computer Ethics
  • 15. Phising Example Computer Ethics
  • 16. Detect and Avoid PhishingBe wary of links and pop-ups from e-mails and browsers. Computer Ethics
  • 17. Detect and Avoid Phishing Computer Ethics
  • 18. Identity TheftIdentity theft occurs when someone uses yourpersonally identifying information, like yourname, Social Security number, or credit cardnumber, without your knowledge, to commit fraud orother crimes. Computer Ethics
  • 19. How Identity Thieves Steal• PhishingPretend to be legitimate companies and send spam orpop-up messages to trick you to revealing yourpersonal information.• SkimmingUse special storage device to steal credit/debit cardinformation during processing Computer Ethics
  • 20. How Identity Thieves Steal• Dumpster DivingRummage through trash looking for bills or documentswith your personal data on it• Old-Fashioned StealingSteal wallets and purses, mail, bankand credit card statements, orpersonnel records Computer Ethics
  • 21. What Thieves Do with Stolen Identity• May open new bank accounts in your name• May open new credit card accounts in your name• May open new phone account and other accounts inyour name• May use your name to obtain utility services likeelectricity, cable, etc.•May obtain loan in your name•May do purchases like house, clothes and avail of tripsand other luxuries in your name Computer Ethics
  • 22. Is Your Identity stolen?• You are charged for debts you didn’t incur• You receive mails about houses orapartments you didn’t buy or jobs younever had• Be denied of loans due to bad credithistory caused by others Computer Ethics
  • 23. Combat Identity TheftDeter Detect Defend Computer Ethics
  • 24. Passwords• Create strong passwords and changethem often• Never give your password oraccount numbers to anyone Computer Ethics
  • 25. Browsing• Enter the URL when doing sensitivetransactions• Access secure websites. Look forhttps:// or a lock. Computer Ethics
  • 26. Software• Do not download software orimages from unknown sources Computer Ethics
  • 27. Software• Install firewall and anti-virus andanti-spyware software. Computer Ethics
  • 28. Social Networking An online service, platform, or site that helpsbuild social networks or social relations among people with shared interests, background, or real life connections. Computer Ethics
  • 29. Social Networking Sites 15 Most Visited Computer Ethics
  • 30. Social Networking Sites 15 Most Visited Computer Ethics
  • 31. Social Networking Sites 15 Most Visited Computer Ethics
  • 32. Social Networking DangersExposure to predators and cybercrimes• Scam/Phishing• Theft• Stalking• Invasion of privacy• Child Exploitation• Pornography Computer Ethics
  • 33. Online DatingMany people use dating sites, socialnetworking sites, and chat rooms to meetpeople. And some forge successfulrelationships. Computer Ethics
  • 34. Online Dating DangersBut predators also use these sites to meetpotential victims.• They create fake profiles to build onlinerelationships.• Eventually convince people to send themmoney or do other favors in the name oflove.• Or worse, do other crimes like rape andother forms of abuse. Computer Ethics
  • 35. Online Dating DangersAn online love interest who asksfor money is almost certainly ascam artist. Computer Ethics
  • 36. Parental Control Tips CheckLimit your kids websites time online. Avoid sex talk No to cyber- bullying Who are in your kid’s contact list? Computer Ethics
  • 37. Computer Ethics
  • 38. Cyber-bullyingPosting hurtful and harmful messagesor material to others on the Internet Computer Ethics
  • 39. Cyber-bullying may occur in• E-mail• Instant messaging• Chat rooms• Social networking sites• Forums• Blogs Computer Ethics
  • 40. Examples of Cyber-bullying Computer Ethics
  • 41. How to Protect Yourself from Online Predators• Do not give too much information about yourself Computer Ethics
  • 42. How to Protect Yourself from Online Predators• Set the right privacy settings Get secured! Computer Ethics
  • 43. How to Protect Yourself from Online Predators Computer Ethics
  • 44. How to Protect Yourself from Online Predators• Increase your awareness of cybercrimeKnowledge is Key! Computer Ethics
  • 45. Thank you for coming!  Computer Ethics
  • 46. References Ethics in Information Technology, G. Reynolds http://www.bizymoms.com/computers-and-technology/uses-of-the-internet.html http://en.wikipedia.org/wiki/Spam_(electronic) http://en.wikipedia.org/wiki/Email_spam http://en.wikipedia.org/wiki/Phishing http://www.scamwatch.gov.au/content/index.phtml/tag/onlinescams http://onguardonline.gov http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx http://www.identitytheft.org/http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html http://www.familysafecomputers.org/predators.htm http://www.ebizmba.com/articles/social-networking-websites http://www.slideshare.net/burtlo/introduction-to-cybersafety-5690788 http://www.slideshare.net/karlmp/internet-safety-2956537 http://www.slideshare.net/grp4.ed451/cyber-predator-presentation-presentation http://www.slideshare.net/caskeyd/students-i-safety http://www.msnbc.msn.com/id/6083442/ns/dateline_nbc/t/dangers-children-face- online/#.UEWpW8EgfSg Computer Ethics