SlideShare a Scribd company logo
1 of 29
Module 2.2
1
Module 2.2
2
Introduction
Techniques and tools of cybercrimes
Categories of computer crime
Protecting yourself against computer crime
Test and improve
3
 Potential hazards and threats
 Malware
 Social engineering
4
Any attempt to manipulate or ‘con’ someone into
giving out confidential information (password or
account number) which can be used to impersonate
them, to install malware, etc.
5
Any software that is written with negative intentions.
6
It refers to attempts from
people to con the user into
giving out personal and
confidential details such as PIN
numbers and passwords, etc. by
posing as a legitimate
organisation, usually via e-mail.
7
Phishing
Scamming practice where user is
redirected to another (fake) website even
when the user types in a ‘valid’ URL in
their browser. The criminal can then use
any data the user enters.
8
An attack where a site appears to one
thing but your clicks are redirected to do
something else.
9
CLICK
E-mail spoofing is the forgery
of an e-mail header so that
the e-mail appears to be from a
different origin (or person).
10
Technique or software that tries to
monitor and track the way you use
your computer and then reports this
information to a third party.
11
Kind of spyware that records your
keystrokes as you type (even the
movements of your mouse, screenshots
of what is displayed on your screen) in
an attempt to discover your usernames
and passwords.
12
Malware written to disrupt the normal
functioning of a person’s computer
without their knowledge or consent.
 Used to turn your computer into a ‘bot’
 to spread malware or
 to create security loopholes for other
programs to exploit.
13
A computer worm is malware that is able
to distribute itself over a network,
normally via e-mail, without a person
having run an infected program.
14
Type of malware which is a destructive
program disguised as a useful
application. Could delete files on your
computer, scan your computer
for personal information.
They rely on you to activate them.
15
Malware that encrypts data (making it
unavailable) until you pay a ransom fee.
16
PAY UP!
Software that downloads onto your
computer and bombards your computer
with adverts that pop-up whenever you
are connected to the internet.
17
! !
A computer that has been compromised
(or infected) and can be controlled
remotely when it is on and connected to
the internet. Also called a ‘zombie’.
18
19
20
Cyberstalking Spam
Uploading unauthorised pictures on
the Web
Cyberbullying
21
Attacks on
businesses –
problems with
conducting
business online
Attacks on
websites –
defaces
websites
Cyberterrorism- attacks
parts of a country’s IT
infrastructure
Denial of
service attacks
(DoS) – uses
bots to flood
servers with
requests.
22
Bandwidth
Identity
Processing time and power
Money
Copyrighted material
Data/Intellectual property
23
24
Anti-virus software
Scans files for different kinds of malware (viruses,
Trojans, keyloggers, spyware etc.) and eliminate it.
Runs in the background.
 Be careful when installing ‘free’ software.
 Check e-banking and e-commerce sites are
encrypted for security (https:// and small
closed lock)
 Have good password policies.
 Stay informed – reports in media and tips on
banking websites.
25
 Don’t give out personal information such as
ID number.
 Don’t click on links in pop-ups. Close it
immediately.
 Don’t click on links in phishing emails.
 Don’t open attachments or programs unless
you are sure of what they are.
 Don’t perform financial transactions on
public computers.
26
 If your workplace/school has computer usage
policy you have accepted, other people might
have access to your files
 If you work on someone else’s computer, they
can claim access to your data files
 Free online services can use your data as
adverts (Instagram, email).
 Online services such as Facebook own
everything you post to the site.
27
28
29


More Related Content

Similar to 2_2 DangersComputerCrime.pptx

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptxtechanicguy
 
Internet security
Internet securityInternet security
Internet securityat1211
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virusShashankRoy11
 

Similar to 2_2 DangersComputerCrime.pptx (20)

cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
My presentation
My presentationMy presentation
My presentation
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet security
Internet securityInternet security
Internet security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 

2_2 DangersComputerCrime.pptx

  • 3. Introduction Techniques and tools of cybercrimes Categories of computer crime Protecting yourself against computer crime Test and improve 3
  • 4.  Potential hazards and threats  Malware  Social engineering 4
  • 5. Any attempt to manipulate or ‘con’ someone into giving out confidential information (password or account number) which can be used to impersonate them, to install malware, etc. 5 Any software that is written with negative intentions.
  • 6. 6
  • 7. It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e-mail. 7 Phishing
  • 8. Scamming practice where user is redirected to another (fake) website even when the user types in a ‘valid’ URL in their browser. The criminal can then use any data the user enters. 8
  • 9. An attack where a site appears to one thing but your clicks are redirected to do something else. 9 CLICK
  • 10. E-mail spoofing is the forgery of an e-mail header so that the e-mail appears to be from a different origin (or person). 10
  • 11. Technique or software that tries to monitor and track the way you use your computer and then reports this information to a third party. 11
  • 12. Kind of spyware that records your keystrokes as you type (even the movements of your mouse, screenshots of what is displayed on your screen) in an attempt to discover your usernames and passwords. 12
  • 13. Malware written to disrupt the normal functioning of a person’s computer without their knowledge or consent.  Used to turn your computer into a ‘bot’  to spread malware or  to create security loopholes for other programs to exploit. 13
  • 14. A computer worm is malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program. 14
  • 15. Type of malware which is a destructive program disguised as a useful application. Could delete files on your computer, scan your computer for personal information. They rely on you to activate them. 15
  • 16. Malware that encrypts data (making it unavailable) until you pay a ransom fee. 16 PAY UP!
  • 17. Software that downloads onto your computer and bombards your computer with adverts that pop-up whenever you are connected to the internet. 17 ! !
  • 18. A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the internet. Also called a ‘zombie’. 18
  • 19. 19
  • 20. 20 Cyberstalking Spam Uploading unauthorised pictures on the Web Cyberbullying
  • 21. 21 Attacks on businesses – problems with conducting business online Attacks on websites – defaces websites Cyberterrorism- attacks parts of a country’s IT infrastructure Denial of service attacks (DoS) – uses bots to flood servers with requests.
  • 22. 22 Bandwidth Identity Processing time and power Money Copyrighted material Data/Intellectual property
  • 23. 23
  • 24. 24 Anti-virus software Scans files for different kinds of malware (viruses, Trojans, keyloggers, spyware etc.) and eliminate it. Runs in the background.
  • 25.  Be careful when installing ‘free’ software.  Check e-banking and e-commerce sites are encrypted for security (https:// and small closed lock)  Have good password policies.  Stay informed – reports in media and tips on banking websites. 25
  • 26.  Don’t give out personal information such as ID number.  Don’t click on links in pop-ups. Close it immediately.  Don’t click on links in phishing emails.  Don’t open attachments or programs unless you are sure of what they are.  Don’t perform financial transactions on public computers. 26
  • 27.  If your workplace/school has computer usage policy you have accepted, other people might have access to your files  If you work on someone else’s computer, they can claim access to your data files  Free online services can use your data as adverts (Instagram, email).  Online services such as Facebook own everything you post to the site. 27
  • 28. 28