2. How much of our personal
information is stored online?
How much of our business
is accessible over
networks?
How much of our customers’
information is accessible
over networks Security?
How much of our life is
depend on the internet?
16. It is the most serious crime in
which a child is a victim
17.
18. Is the most common
form of online
extortion where the
victim is a woman and
the offender is a man
or woman
19.
20. A girl adds the victim from
social network and ask him to
have sex through the web
cam, then the criminal become
a man and force him to send
money.
21.
22.
23. Is the most common form of Cyber
Extortion where the victim is a
woman and the offender is a man or
woman
24. Such demand the victim to do
sex with her or another person
otherwise publishing the video
or pics
25. Such as demand the victim to
promote him in work or collect
information for him or commit
crimes like delivering drugs or
prostitution
26.
27.
28.
29. -Criminals send an email that appears to
be from a legitimate company and ask
the victim to provide his sensitive
information
- This is usually done by including a link
that will appear to take the victim to the
company’s website to fill his formation
which goes to the crooks behind the scam
30. Form jacking is a cyber
crime where hackers run
a malicious code on the
forms available on the
website. Data keyed in
using the form are then
stolen by the hacker.
This includes credit and
debit card details that
user enter while
purchasing the goods
online
Form jacking
39. Cyber investigation challenges
1- maintaining cyber crime scene by the security officer
2- the security officer should be aware of his
responsibilities
3- security officer should monitor the authorization levels
accesses