IS201 Internet Crime and Safety


Published on

For academic purposes only.
Sources of information are compiled and indicated in the Reference section of the presentation. Images or pictures are obtained from Google search.

Published in: Education, Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

IS201 Internet Crime and Safety

  1. 1. A Computer Ethics Seminar Presented by: Jennifer June JaenUniversity of the Philippines Open University Computer Ethics
  2. 2. Internet Crime and Safety Sept. 9, 2012 Cebu City Computer Ethics
  3. 3. Objectives of the Seminar• To be able to identify vulnerabilities in the use of theInternet such as in social networking sites, e-commerce, and e-mail• To be able to identify, detect, and protect from certaintypes of cyber-attacks such as cyber-bullying, unethicalhacking, and identity theft• To identify the role of privacy and freedom ofexpression in the proliferation of Internet crime such aspornography Computer Ethics
  4. 4. It is a crime committed using a computer orthe Internet by an individual or organization. Computer Ethics
  5. 5. Perpetrators of Cybercrime• Hackers Test limit of system and gain publicity• Crackers Steal data, corrupt systems, create problems Computer Ethics
  6. 6. Perpetrators of Cybercrime• Insider Corrupt systems, make money• Industrial spy Capture trade secrets, for competition Computer Ethics
  7. 7. Perpetrators of Cybercrime• Cybercriminal Make money• Cyber-terrorist Destroy key infrastructure Computer Ethics
  8. 8. VirusThese are malicious software that arecreated by cybercriminals who use theinternet to perpetrate their crimes Computer Ethics
  9. 9. SpamSpam is the abuse of electronicmessaging systems to indiscriminatelysend unsolicited bulk messages Computer Ethics
  10. 10. ScamComputer Ethics
  11. 11. Scam examples Computer Ethics
  12. 12. Phishing It is an attempt to acquire informationsuch as usernames, passwords, creditcard details by masquerading as alegitimate business. Computer Ethics
  13. 13. PhishingThe senders are phishing for yourpersonal information so they canuse it to commit fraud. Computer Ethics
  14. 14. Phising Example Computer Ethics
  15. 15. Phising Example Computer Ethics
  16. 16. Detect and Avoid PhishingBe wary of links and pop-ups from e-mails and browsers. Computer Ethics
  17. 17. Detect and Avoid Phishing Computer Ethics
  18. 18. Identity TheftIdentity theft occurs when someone uses yourpersonally identifying information, like yourname, Social Security number, or credit cardnumber, without your knowledge, to commit fraud orother crimes. Computer Ethics
  19. 19. How Identity Thieves Steal• PhishingPretend to be legitimate companies and send spam orpop-up messages to trick you to revealing yourpersonal information.• SkimmingUse special storage device to steal credit/debit cardinformation during processing Computer Ethics
  20. 20. How Identity Thieves Steal• Dumpster DivingRummage through trash looking for bills or documentswith your personal data on it• Old-Fashioned StealingSteal wallets and purses, mail, bankand credit card statements, orpersonnel records Computer Ethics
  21. 21. What Thieves Do with Stolen Identity• May open new bank accounts in your name• May open new credit card accounts in your name• May open new phone account and other accounts inyour name• May use your name to obtain utility services likeelectricity, cable, etc.•May obtain loan in your name•May do purchases like house, clothes and avail of tripsand other luxuries in your name Computer Ethics
  22. 22. Is Your Identity stolen?• You are charged for debts you didn’t incur• You receive mails about houses orapartments you didn’t buy or jobs younever had• Be denied of loans due to bad credithistory caused by others Computer Ethics
  23. 23. Combat Identity TheftDeter Detect Defend Computer Ethics
  24. 24. Passwords• Create strong passwords and changethem often• Never give your password oraccount numbers to anyone Computer Ethics
  25. 25. Browsing• Enter the URL when doing sensitivetransactions• Access secure websites. Look forhttps:// or a lock. Computer Ethics
  26. 26. Software• Do not download software orimages from unknown sources Computer Ethics
  27. 27. Software• Install firewall and anti-virus andanti-spyware software. Computer Ethics
  28. 28. Social Networking An online service, platform, or site that helpsbuild social networks or social relations among people with shared interests, background, or real life connections. Computer Ethics
  29. 29. Social Networking Sites 15 Most Visited Computer Ethics
  30. 30. Social Networking Sites 15 Most Visited Computer Ethics
  31. 31. Social Networking Sites 15 Most Visited Computer Ethics
  32. 32. Social Networking DangersExposure to predators and cybercrimes• Scam/Phishing• Theft• Stalking• Invasion of privacy• Child Exploitation• Pornography Computer Ethics
  33. 33. Online DatingMany people use dating sites, socialnetworking sites, and chat rooms to meetpeople. And some forge successfulrelationships. Computer Ethics
  34. 34. Online Dating DangersBut predators also use these sites to meetpotential victims.• They create fake profiles to build onlinerelationships.• Eventually convince people to send themmoney or do other favors in the name oflove.• Or worse, do other crimes like rape andother forms of abuse. Computer Ethics
  35. 35. Online Dating DangersAn online love interest who asksfor money is almost certainly ascam artist. Computer Ethics
  36. 36. Parental Control Tips CheckLimit your kids websites time online. Avoid sex talk No to cyber- bullying Who are in your kid’s contact list? Computer Ethics
  37. 37. Computer Ethics
  38. 38. Cyber-bullyingPosting hurtful and harmful messagesor material to others on the Internet Computer Ethics
  39. 39. Cyber-bullying may occur in• E-mail• Instant messaging• Chat rooms• Social networking sites• Forums• Blogs Computer Ethics
  40. 40. Examples of Cyber-bullying Computer Ethics
  41. 41. How to Protect Yourself from Online Predators• Do not give too much information about yourself Computer Ethics
  42. 42. How to Protect Yourself from Online Predators• Set the right privacy settings Get secured! Computer Ethics
  43. 43. How to Protect Yourself from Online Predators Computer Ethics
  44. 44. How to Protect Yourself from Online Predators• Increase your awareness of cybercrimeKnowledge is Key! Computer Ethics
  45. 45. Thank you for coming!  Computer Ethics
  46. 46. References Ethics in Information Technology, G. Reynolds online/#.UEWpW8EgfSg Computer Ethics