SlideShare a Scribd company logo
1 of 16
Fraud and Identity Theft
 Cybercrime: Any criminal action perpetrated primarily through the use of a computer
 Programs damaging computers
 Stealing identities online
 Attacking corporate websites
 Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime.
 Top categories of complaints
 FBI-related scams
 Identity theft
 Nonauction/nondelivery of merchandise
 Advance fee fraud
 Identity theft: Occurs when a thief steals personal information such as your name, address,
Social Security number, birth date, bank account, and credit card information and runs up debt
in your name
 Acts perpetrated by identity thieves
 Counterfeiting existing credit and debit cards
 Requesting changes of address on bank and credit card statements
 Obtaining new credit cards and bank account in your name and writing bad checks and not paying off
credit card balances
 Obtaining medical services in your name
 Buying a home with a mortgage in your name, then reselling the house
 The victim receives a phone call from
someone who pretends to be a computer
security person.
 The caller tricks the victim into installing
some software to remove some
vulnerability.
 The scammer then uses this software to
gain control and steal information from
the victims computer.
 Other scams: Showmypc.com
 This is a money transfer scam.
 The scammers contact victims by email or letter
and offer to share in a large sum of money that they
want to transfer out of their country.
 They sell the story using the excuse of civil war,
coups, etc. or inheritance that are difficult to access
because of government restrictions or taxes.
 They ask you to pay some money up front to help
with the transfer only to never be heard of again.
 A hacker uses this method try to
get a users to visit links or sites
and enter their information.
 The sites look and feel like legit
sites, but are designed to steal user
information.
 Keep hackers out
 Prevent them from accessing
computer
 Protect your digital information
 Use passwords
 Hide activities from prying eyes
 Firewall: Software program or hardware device designed to protect
computers from hackers
 Personal firewall: Specifically designed for home networks
 Both Windows and OS X include firewalls
 Security suites also include firewall software
 You can also buy and configure hardware firewall devices
 Strong passwords are difficult to guess
 Not easily associated with you (birth date, name
of pet, nickname)
 At least 14 characters, including numbers,
symbols, and upper- and lowercase letters
 Not a single word or a word from a dictionary
 Use a mix of upper- and lowercase letters and
symbols
 Never tell anyone or write down password
 Change password regularly (every month)
 Use different passwords for different websites
 Password strength tests evaluate your passwords
 Password Meter
 Operating systems have built-in password protection
 Windows 8 allows you to use picture passwords
 Current versions of Google Chrome, Firefox,
and Internet Explorer include privacy tools that
help you surf the web anonymously
 Incognito
 Private Browsing
 InPrivate
 Portable privacy devices provide an even higher
level of surfing privacy
 Imation Personal Flash Drive
 Store sensitive Internet files
 Preload Linux OS on a flash drive to avoid using
the public or work computer’s OS
 Third-party software developers offer apps to
enhance tablet security
 hidePad
 Reveal as little information as possible
 Your Social Security number, phone number, date of birth,
and street addresses are four key pieces of information that
identity thieves need to steal an identity. This information
should never be shared in a public area on any website.
 Social networking sites like Facebook make privacy
settings available in your profile settings. If you’ve never
changed your default privacy settings in Facebook, you’re
probably sharing information more widely than you
should.
 Data on your computer faces three major threats
 Unauthorized access
 Tampering
 Destruction
 Backups are copies of files that you can use to replace the
originals If they’re lost or damaged
 Backups must be stored away from where your computer is
located and should be stored in at least two different
places to be truly secure
 Three main choices
 Online (in the cloud)
 External hard drives
 Network-attached storage (NAS)
 The ATM scam involves the use of
information obtained from one’s ATM
cards and stealing from them.
 This form of cybercrime involves the use of
card readers, hidden cameras and burglary
to obtain information on people’s bank
accounts and spin numbers.
 These are used to withdraw cash with
replica cards without the bank’s or the
customer’s knowledge.
 There are several ways in which this crime
can be committed with the cooperation of
the unsuspecting customers.
 Use of Gadgets to read Personal Data
 The criminals may attach false facades on the ATMs set up in unsecure areas to
capture customer’s cards.
 Ghost ATM Machines: Freestanding machines would be set up on busy places
where people may need to withdraw their money more frequently and
unsuspectingly.
 Criminals place cash receptacle machine inside the ATM machine vestibules to
confuse the clients.
 Snatching of the cards from clients
 Four main security concerns with computerized devices
 Keeping them from being stolen
 Keeping data secure in case they are stolen
 Finding a device if it is stolen
 Remotely recovering and wiping data off a stolen device
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall 15
 The methods used in committing cyber frauds and scam keep developing each
and everyday.
 The forms used vary from technological forms
 These crimes can however be prevented by the banks in application of the
latest forms of technology in ensuring safety to client accounts. Application of
high security measures would also be ideal.
 Customers can also help in prevention of the crimes by being watchful of their
surrounding to avoid being tricked or mugged.

More Related Content

What's hot

Phishing
PhishingPhishing
Phishingdefquon
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Viewers also liked

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technologyaaberra
 
Backing up your data
Backing up your dataBacking up your data
Backing up your dataaaberra
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBRITTO EDISON
 
Working Experiences in Amkor Technology
Working Experiences in Amkor TechnologyWorking Experiences in Amkor Technology
Working Experiences in Amkor TechnologyRita Hsiung
 
Foshan kangwosi furniture new models
Foshan kangwosi furniture new modelsFoshan kangwosi furniture new models
Foshan kangwosi furniture new modelsRuby Zhang
 
TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07Evelyn Fox
 
ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)Ankita Nagane
 
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin FilmsElectrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin Filmsiosrjce
 
3D modelling process
3D modelling process3D modelling process
3D modelling processtommyorg
 
2luncheonsale
2luncheonsale2luncheonsale
2luncheonsaleBotoBata
 
30sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp0230sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp02Fjacobo
 
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through ProjectsChallenge:Future
 

Viewers also liked (19)

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
 
Working Experiences in Amkor Technology
Working Experiences in Amkor TechnologyWorking Experiences in Amkor Technology
Working Experiences in Amkor Technology
 
Real
RealReal
Real
 
Foshan kangwosi furniture new models
Foshan kangwosi furniture new modelsFoshan kangwosi furniture new models
Foshan kangwosi furniture new models
 
TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07
 
ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)
 
Bachlor Of Law
Bachlor Of LawBachlor Of Law
Bachlor Of Law
 
Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise
 
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin FilmsElectrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
 
Portfolio
PortfolioPortfolio
Portfolio
 
3D modelling process
3D modelling process3D modelling process
3D modelling process
 
2luncheonsale
2luncheonsale2luncheonsale
2luncheonsale
 
30sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp0230sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp02
 
Scan
ScanScan
Scan
 
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
 
El aguacate y yo
El aguacate y yoEl aguacate y yo
El aguacate y yo
 

Similar to Lock It Down, Keep It Safe

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Data theft
Data theftData theft
Data theftLaura
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 

Similar to Lock It Down, Keep It Safe (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Data theft
Data theftData theft
Data theft
 
Computer security
Computer securityComputer security
Computer security
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Internet security
Internet securityInternet security
Internet security
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Information security
Information securityInformation security
Information security
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

Lock It Down, Keep It Safe

  • 2.  Cybercrime: Any criminal action perpetrated primarily through the use of a computer  Programs damaging computers  Stealing identities online  Attacking corporate websites  Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime.  Top categories of complaints  FBI-related scams  Identity theft  Nonauction/nondelivery of merchandise  Advance fee fraud
  • 3.  Identity theft: Occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account, and credit card information and runs up debt in your name  Acts perpetrated by identity thieves  Counterfeiting existing credit and debit cards  Requesting changes of address on bank and credit card statements  Obtaining new credit cards and bank account in your name and writing bad checks and not paying off credit card balances  Obtaining medical services in your name  Buying a home with a mortgage in your name, then reselling the house
  • 4.  The victim receives a phone call from someone who pretends to be a computer security person.  The caller tricks the victim into installing some software to remove some vulnerability.  The scammer then uses this software to gain control and steal information from the victims computer.  Other scams: Showmypc.com
  • 5.  This is a money transfer scam.  The scammers contact victims by email or letter and offer to share in a large sum of money that they want to transfer out of their country.  They sell the story using the excuse of civil war, coups, etc. or inheritance that are difficult to access because of government restrictions or taxes.  They ask you to pay some money up front to help with the transfer only to never be heard of again.
  • 6.  A hacker uses this method try to get a users to visit links or sites and enter their information.  The sites look and feel like legit sites, but are designed to steal user information.
  • 7.  Keep hackers out  Prevent them from accessing computer  Protect your digital information  Use passwords  Hide activities from prying eyes
  • 8.  Firewall: Software program or hardware device designed to protect computers from hackers  Personal firewall: Specifically designed for home networks  Both Windows and OS X include firewalls  Security suites also include firewall software  You can also buy and configure hardware firewall devices
  • 9.  Strong passwords are difficult to guess  Not easily associated with you (birth date, name of pet, nickname)  At least 14 characters, including numbers, symbols, and upper- and lowercase letters  Not a single word or a word from a dictionary  Use a mix of upper- and lowercase letters and symbols  Never tell anyone or write down password  Change password regularly (every month)  Use different passwords for different websites  Password strength tests evaluate your passwords  Password Meter  Operating systems have built-in password protection  Windows 8 allows you to use picture passwords
  • 10.  Current versions of Google Chrome, Firefox, and Internet Explorer include privacy tools that help you surf the web anonymously  Incognito  Private Browsing  InPrivate  Portable privacy devices provide an even higher level of surfing privacy  Imation Personal Flash Drive  Store sensitive Internet files  Preload Linux OS on a flash drive to avoid using the public or work computer’s OS  Third-party software developers offer apps to enhance tablet security  hidePad
  • 11.  Reveal as little information as possible  Your Social Security number, phone number, date of birth, and street addresses are four key pieces of information that identity thieves need to steal an identity. This information should never be shared in a public area on any website.  Social networking sites like Facebook make privacy settings available in your profile settings. If you’ve never changed your default privacy settings in Facebook, you’re probably sharing information more widely than you should.
  • 12.  Data on your computer faces three major threats  Unauthorized access  Tampering  Destruction  Backups are copies of files that you can use to replace the originals If they’re lost or damaged  Backups must be stored away from where your computer is located and should be stored in at least two different places to be truly secure  Three main choices  Online (in the cloud)  External hard drives  Network-attached storage (NAS)
  • 13.  The ATM scam involves the use of information obtained from one’s ATM cards and stealing from them.  This form of cybercrime involves the use of card readers, hidden cameras and burglary to obtain information on people’s bank accounts and spin numbers.  These are used to withdraw cash with replica cards without the bank’s or the customer’s knowledge.  There are several ways in which this crime can be committed with the cooperation of the unsuspecting customers.
  • 14.  Use of Gadgets to read Personal Data  The criminals may attach false facades on the ATMs set up in unsecure areas to capture customer’s cards.  Ghost ATM Machines: Freestanding machines would be set up on busy places where people may need to withdraw their money more frequently and unsuspectingly.  Criminals place cash receptacle machine inside the ATM machine vestibules to confuse the clients.  Snatching of the cards from clients
  • 15.  Four main security concerns with computerized devices  Keeping them from being stolen  Keeping data secure in case they are stolen  Finding a device if it is stolen  Remotely recovering and wiping data off a stolen device Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 15
  • 16.  The methods used in committing cyber frauds and scam keep developing each and everyday.  The forms used vary from technological forms  These crimes can however be prevented by the banks in application of the latest forms of technology in ensuring safety to client accounts. Application of high security measures would also be ideal.  Customers can also help in prevention of the crimes by being watchful of their surrounding to avoid being tricked or mugged.

Editor's Notes

  1. Because they’re portable, laptops, tablets, and phones are easy targets for thieves. You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device