2. Cybercrime: Any criminal action perpetrated primarily through the use of a computer
Programs damaging computers
Stealing identities online
Attacking corporate websites
Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime.
Top categories of complaints
FBI-related scams
Identity theft
Nonauction/nondelivery of merchandise
Advance fee fraud
3. Identity theft: Occurs when a thief steals personal information such as your name, address,
Social Security number, birth date, bank account, and credit card information and runs up debt
in your name
Acts perpetrated by identity thieves
Counterfeiting existing credit and debit cards
Requesting changes of address on bank and credit card statements
Obtaining new credit cards and bank account in your name and writing bad checks and not paying off
credit card balances
Obtaining medical services in your name
Buying a home with a mortgage in your name, then reselling the house
4. The victim receives a phone call from
someone who pretends to be a computer
security person.
The caller tricks the victim into installing
some software to remove some
vulnerability.
The scammer then uses this software to
gain control and steal information from
the victims computer.
Other scams: Showmypc.com
5. This is a money transfer scam.
The scammers contact victims by email or letter
and offer to share in a large sum of money that they
want to transfer out of their country.
They sell the story using the excuse of civil war,
coups, etc. or inheritance that are difficult to access
because of government restrictions or taxes.
They ask you to pay some money up front to help
with the transfer only to never be heard of again.
6. A hacker uses this method try to
get a users to visit links or sites
and enter their information.
The sites look and feel like legit
sites, but are designed to steal user
information.
7. Keep hackers out
Prevent them from accessing
computer
Protect your digital information
Use passwords
Hide activities from prying eyes
8. Firewall: Software program or hardware device designed to protect
computers from hackers
Personal firewall: Specifically designed for home networks
Both Windows and OS X include firewalls
Security suites also include firewall software
You can also buy and configure hardware firewall devices
9. Strong passwords are difficult to guess
Not easily associated with you (birth date, name
of pet, nickname)
At least 14 characters, including numbers,
symbols, and upper- and lowercase letters
Not a single word or a word from a dictionary
Use a mix of upper- and lowercase letters and
symbols
Never tell anyone or write down password
Change password regularly (every month)
Use different passwords for different websites
Password strength tests evaluate your passwords
Password Meter
Operating systems have built-in password protection
Windows 8 allows you to use picture passwords
10. Current versions of Google Chrome, Firefox,
and Internet Explorer include privacy tools that
help you surf the web anonymously
Incognito
Private Browsing
InPrivate
Portable privacy devices provide an even higher
level of surfing privacy
Imation Personal Flash Drive
Store sensitive Internet files
Preload Linux OS on a flash drive to avoid using
the public or work computer’s OS
Third-party software developers offer apps to
enhance tablet security
hidePad
11. Reveal as little information as possible
Your Social Security number, phone number, date of birth,
and street addresses are four key pieces of information that
identity thieves need to steal an identity. This information
should never be shared in a public area on any website.
Social networking sites like Facebook make privacy
settings available in your profile settings. If you’ve never
changed your default privacy settings in Facebook, you’re
probably sharing information more widely than you
should.
12. Data on your computer faces three major threats
Unauthorized access
Tampering
Destruction
Backups are copies of files that you can use to replace the
originals If they’re lost or damaged
Backups must be stored away from where your computer is
located and should be stored in at least two different
places to be truly secure
Three main choices
Online (in the cloud)
External hard drives
Network-attached storage (NAS)
13. The ATM scam involves the use of
information obtained from one’s ATM
cards and stealing from them.
This form of cybercrime involves the use of
card readers, hidden cameras and burglary
to obtain information on people’s bank
accounts and spin numbers.
These are used to withdraw cash with
replica cards without the bank’s or the
customer’s knowledge.
There are several ways in which this crime
can be committed with the cooperation of
the unsuspecting customers.
14. Use of Gadgets to read Personal Data
The criminals may attach false facades on the ATMs set up in unsecure areas to
capture customer’s cards.
Ghost ATM Machines: Freestanding machines would be set up on busy places
where people may need to withdraw their money more frequently and
unsuspectingly.
Criminals place cash receptacle machine inside the ATM machine vestibules to
confuse the clients.
Snatching of the cards from clients
16. The methods used in committing cyber frauds and scam keep developing each
and everyday.
The forms used vary from technological forms
These crimes can however be prevented by the banks in application of the
latest forms of technology in ensuring safety to client accounts. Application of
high security measures would also be ideal.
Customers can also help in prevention of the crimes by being watchful of their
surrounding to avoid being tricked or mugged.
Editor's Notes
Because they’re portable, laptops, tablets, and phones are easy targets for thieves. You have four main security concerns with mobile devices:
Keeping them from being stolen
Keeping data secure in case they are stolen
Finding a device if it is stolen
Remotely recovering and wiping data off a stolen device