SlideShare a Scribd company logo
1 of 12
CYBERCRIME
PRESENTER: PRINCE BANTON
CYBERCRIME
• Cybercrime management is very
important in this modern age even
though it is almost impossible to
avoid being a victim of cybercrime
but it keeps you up to date with the
different antivirus software and
creates awareness of where and who
you divulge your personal
information with.
CYBERCRIME
• It seems almost impossible to
avoid being a victim of
cybercrime, with all the
advancements in technology
which make it easy for someone
to perform cybercrimes.
(Park, 2021)
CYBERCRIME
• There are some ways however to
avoid becoming a victim of
cybercrime. Most internet browsers
email service, and Internet providers
provide a spam-blocking feature to
prevent unwanted messages, such as
fraudulent emails and phishing
emails, from getting to your inbox.
LAW
ENFORCEMENT
• Police, prosecutors and
judges need to understand
these crimes, they need the
tools to investigate and go
after the criminals and
protect the victims and they
need to be able to prosecute
and adjudicate cases.
ACTION PLAN
• We need to reinforce these efforts by
working with an Internet Watch Foundation,
• Launch a child sexual abuse reporting
portal.
• Strengthen international cooperation and
dialogue between governments, the United
Nations, other international as well as
regional organizations, INTERPOL and the
many other partners, including business
and civil society.
SOFTWARE
• Install and keep up-to-date
antivirus programs, firewalls
and spyware checkers.
• Keep them up to date,
users must make sure that
they run the scans regularly.
(Criminology, 2021)
SOFTWARE
• Many companies out there
provide free software, many
produced by the leading
companies’providers; in addition,
those companies provide free
version of their paid or
subscription antivirus software.
WEBSITES
• Be weary of who you divulge
your personal information to.
• Avoid unknown websites, in
particular those that ask for
your name, mailing address,
bank account number or social
security number.
CYBERCRIME
Countering cybercrime can save lives,
grow prosperity and build peace.
By strengthening law enforcement
capacities and partnering with
businesses so they can be part of the
solution,
Unite with other countries to provide the
necessary training to sharpen
investigative skills and trace
cryptocurrencies (Fedetov, 2020)
CONCLUSION
Cybercrime is an international threat
that needs to be handled carefully.
Cybercrimes will always be an ongoing
challenge despite the advancements
being made by numerous countries.
The everyday individuals and
businesses need to make sure they are
educated on how to manage this
enormous threat.
Prince banton cybercrime presentation

More Related Content

What's hot

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma
 

What's hot (20)

Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
it act
it actit act
it act
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 

Similar to Prince banton cybercrime presentation

You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
taishao1
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
Michalis Mavis, MSc, MSc
 

Similar to Prince banton cybercrime presentation (20)

You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURECYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
CYBER SECURITY AWARENESS AND CYBER RESILIENT FUTURE
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 

Prince banton cybercrime presentation

  • 2. CYBERCRIME • Cybercrime management is very important in this modern age even though it is almost impossible to avoid being a victim of cybercrime but it keeps you up to date with the different antivirus software and creates awareness of where and who you divulge your personal information with.
  • 3. CYBERCRIME • It seems almost impossible to avoid being a victim of cybercrime, with all the advancements in technology which make it easy for someone to perform cybercrimes. (Park, 2021)
  • 4. CYBERCRIME • There are some ways however to avoid becoming a victim of cybercrime. Most internet browsers email service, and Internet providers provide a spam-blocking feature to prevent unwanted messages, such as fraudulent emails and phishing emails, from getting to your inbox.
  • 5. LAW ENFORCEMENT • Police, prosecutors and judges need to understand these crimes, they need the tools to investigate and go after the criminals and protect the victims and they need to be able to prosecute and adjudicate cases.
  • 6. ACTION PLAN • We need to reinforce these efforts by working with an Internet Watch Foundation, • Launch a child sexual abuse reporting portal. • Strengthen international cooperation and dialogue between governments, the United Nations, other international as well as regional organizations, INTERPOL and the many other partners, including business and civil society.
  • 7. SOFTWARE • Install and keep up-to-date antivirus programs, firewalls and spyware checkers. • Keep them up to date, users must make sure that they run the scans regularly. (Criminology, 2021)
  • 8. SOFTWARE • Many companies out there provide free software, many produced by the leading companies’providers; in addition, those companies provide free version of their paid or subscription antivirus software.
  • 9. WEBSITES • Be weary of who you divulge your personal information to. • Avoid unknown websites, in particular those that ask for your name, mailing address, bank account number or social security number.
  • 10. CYBERCRIME Countering cybercrime can save lives, grow prosperity and build peace. By strengthening law enforcement capacities and partnering with businesses so they can be part of the solution, Unite with other countries to provide the necessary training to sharpen investigative skills and trace cryptocurrencies (Fedetov, 2020)
  • 11. CONCLUSION Cybercrime is an international threat that needs to be handled carefully. Cybercrimes will always be an ongoing challenge despite the advancements being made by numerous countries. The everyday individuals and businesses need to make sure they are educated on how to manage this enormous threat.