Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Multimedia12 by aparajeeta


Published on

this slide is very important for multimedia student.

Published in: Education
  • Be the first to comment

  • Be the first to like this

Multimedia12 by aparajeeta

  2. 2. Cyber Crime is a crime is committed online .An example is when someone steal your credit card number online and then uses it without your permission. Computer crime is one of the fastest-growing types of illegal activity, both in the U.S. and internationally. While the Internet links people together like never before, it also provides endless opportunity to criminals seeking to exploit the vulnerabilities of others. Cyber crime statistics are staggering. Nearly 73% of Americans have encountered some form of computer crime or attempted crime on the Web. These types of crime are notoriously hard to solve and sometimes occur without the victim ever knowing anything illegal has taken place. Despite the risks, there are things you can do to help protect yourself from becoming one of the many cyber crime statistics.
  3. 3. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence. The growing list of cybercrimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft, stalking, bullying and terrorism. Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  4. 4. There are several different types of computer crime, many of which overlap. Below are a few of the most commonly reported. Phishing – Phishing is the practice of sending fraudulent emails in an attempt to trick the recipient, usually for the purpose of obtaining money. The elderly are particularly vulnerable to these types of cyber crime. Hacking – Hacking is similar to digital trespassing. Hackers infiltrate online networks to illegally download confidential information, manipulate functions and in some cases steal identities that can be used to fraudulently purchase goods online. Stalking and/or Harassment – Not all types of cyber crime involve money. Some cyber criminals use the Internet as a cover for other illegal behaviors like stalking, harassment and in lesser cases, bullying.
  5. 5. Though cyber crime statistics are on the rise, even the most serious Internet criminals rarely make the FBI Fugitives List. These types of perpetrators are extremely difficult to track down. In fact, the FBI says at least 25% of all cyber crimes aren’t able to be prosecuted. However, it’s not that difficult to stop many cyber criminals if you know what to look for. The Internet isn’t totally anonymous, and anonymity is what most criminals count on to keep their illegal activities under wraps.
  6. 6. For many Crime Stoppers home is the first line of defense, particularly when children are involved. Be sure your Internet connection is password-protected and your server is encrypted. If kids are using the Web, know what sites they’re visiting and exactly who they’re talking to. Children are particularly vulnerable for cyber crime because they’re naturally less skeptical than adults. Be sure you teach your kids the dangers of the Web and give them concrete rules to follow when using the computer. Parents ,Teachers ,Non-profits government ,and industry have been working hard to protect kid online . However , we also need to think about protecting the internet from kids who might abuse it.
  7. 7. It’s crucial to go a step beyond finding out “what is cyber crime?” and learn more about the specific risks surrounding your online activities. if you like to purchase clothing online, for example, check to be sure all the sites you purchase from have a nationally affiliated security certification. if you like to visit chat rooms, never give out any personal information to anyone you don’t know . Also, check crime reports in your area to be sure there isn’t a cyber criminal out there preying on people like you. Know the online warning signs The Web can be a perfectly safe place to learn, connect and shop, but you have to know what to avoid. If you see any of the following while online, assume a cyber criminal is at work: • Suspicious “official” websites that look amateurish or poorly maintained • Emails asking for personal information or passwords • Sites requesting credit card information for entry • Unsolicited communication from someone you don’t know • Threatening or troubling language
  8. 8. Computer crime isn’t victimless. Millions of people lose money to ruthless cyber criminals every year, and some are actually physically harmed by people they meet online. When you’re using the Web, remember to stay alert, stay aware and protect your information. The department of justice categorize computer crime in three ways. • The computer has a target – Attacking the computer of other (spreading virus is an example.) • The computer as a weapon-Using a computer to commit “traditional crime” that we see in the physical world.(such as fraud or illegal gambling) • The computer as a necessary – Using a computer as a "fancy filling" cabinet to store illegal or stolen information.