SlideShare a Scribd company logo
1 of 29
CYBER CRIME
Grade 10 students 
ICT INTEGRATED INTO LEADERSHIP AND 
SERVICE 
17th October, 2014. 
Surefoot International School 
Calabar, Nigeria.
Cybercrime is a term for any illegal activity that uses a 
computer as its primary means of commission. The U.S. 
Department of Justice expands the definition of 
cybercrime to include any illegal activity that uses a 
computer for the storage of evidence.
Types of cyber crimes 
1. HACKING
This is the process of gaining unauthorized 
access into a computer system or data belonging 
to someone else. 
Types range from outside parties who hack into a 
computer network to phishing programs which 
give users a false sense of security, prompting 
them to divulge sensitive information.
2. ELECTRONIC FUNDS TRANSFER 
FRAUD
Electronic funds transfer systems have begun to 
be exploited, and so has the risk that such 
transactions may be intercepted and diverted. 
Valid credit card numbers can be intercepted 
electronically, as well as physically; the digital 
information stored on a card can be 
counterfeited.
DISSEMINATION OF 
OFFENSIVE 
MATERIALS
There are many others like: 
THEFT OF TELECOMMUNICATIONS SERVICES 
COMMUNICATIONS IN FURTHERANCE OF 
CRIMINAL CONSPIRACIES 
TELECOMMUNICATIONS PIRACY 
ELECTRONIC MONEY LAUNDERING AND TAX 
EVASION 
E.T.C
EFFECTS OF CYBERCRIME
THE EFFECTS 
The effects may vary from: 
Loss Of Revenue 
Wasted Time 
Damaged Reputations 
Reproduced Productivity
LOSS OF REVENUE 
One of the main effects of cyber 
crime on a company is a loss of 
revenue. This loss can be caused by 
an outside party who obtains 
sensitive financial information, using 
it to withdraw funds from an 
organization. It can also occur when 
a business's e-commerce site
WASTED TIME 
Another major effect or 
consequence of cyber crime is the 
time that is wasted when an IT 
personnel devotes great portions of 
their day handling such incidences. 
Rather than working on productive 
measures for an organization, many 
IT staff members spend a large
DAMAGED 
REPUTATIONS 
In cases where customer records 
are compromised by a security 
breach associated with cyber crime, 
a company's reputation can take a 
major hit. Customers whose credit 
cards or other financial data 
become intercepted by hackers or 
other infiltrators
REDUCED PRODUCTIVITY 
Due to the measures that many 
companies must implement to 
stabilize cyber crime, there is often 
a negative effect on employees' 
productivity. This is due to security 
measures, employees must enter 
more passwords and perform other 
time-consuming acts in order to do
So far, we have seen that, 
cybercrimes are done through 
computer networks, which enable 
hackers to get ones personal 
information (hacking) and use it for 
illegal activities. 
Let’s have a look at how to 
prevent cybercrimes.
PREVENTION 
Secure your computer 
•Activate your firewall 
•Use anti-virus software 
•Block spyware attacks 
•Keep your system updated 
 Protect your E-identity
CALL FOR HELP 
If you are a victim, if you 
encounter illegal Internet content 
(e.g. child exploitation) or if you 
suspect a computer crime, identity 
theft or a commercial scam, report 
this to your local police.
EDUCATION 
Hackers aren’t the only ones who 
can gain power from information. 
By educating yourself about the 
types of scams that exist on the 
Internet and how to avert them, 
you are putting yourself one step 
ahead of the cybercriminals.
CLICK WITH CAUTION 
•When you’re on internet, be 
careful not to click on any link in 
messages from people you don’t 
know. Even if the message is 
from someone you know, be 
cautious. Some viruses replicate 
and spread through email, so look 
for information that indicates
PRACTICE SAFE SHOPPING 
Be cautious when 
shopping at a site 
that you’ve never 
visited before and do 
a little investigation 
before you enter your 
payment information.
BE CAREFUL ON WI-FI 
Laptops and phones both 
‘remember’ Wi-Fi networks which 
they have ‘used’ – so hackers can 
use this to break in. Avoid 
conducting financial or corporate 
transactions on public networks. 
Also, Wi-Fi (wireless) networks at
USE STRONG PASSWORDS 
Although it may be easier for you 
to remember short passwords, 
strong passwords can go a long way 
in helping secure your information, 
so choose a password that consists 
of a combination of letters, 
numbers and special characters and
COMMANDMENTS ON 
CYBERCRIME 
•I will not share personal data with whomsoever it may be, 
unless known. 
•I will never meet someone in person with whom i come across 
online. 
•I will not post or download inappropriate files on the internet. 
•I will not share my password with anyone.
COMMANDMENTS ON 
CYBERCRIME 
•I will not do any bank transactions on public Wi-Fi as it may 
subject to banking fraud. 
•I will not click on any unknown links as they may contain 
harmful viruses.
THE 
END 
Presented By 
Chaitali 
Ebito 
Tega 
Emaediong 
Oscar 
ICT Coordinator - Mohan Robert 
Homeroom Teacher - Emmanuel Isong 
ICT Support - Caleb

More Related Content

What's hot

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 

What's hot (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 

Viewers also liked

Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary Schoolsbrokvam
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And PunishmentShabbir Terai
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011Mel Tan
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary EducationRex Galos
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally ExcellentLeslie Bradshaw
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (14)

Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary School
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And Punishment
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Crime

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 

Similar to Cyber Crime (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Information security
Information securityInformation security
Information security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Cyber Crime

  • 2. Grade 10 students ICT INTEGRATED INTO LEADERSHIP AND SERVICE 17th October, 2014. Surefoot International School Calabar, Nigeria.
  • 3.
  • 4. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. Types of cyber crimes 1. HACKING
  • 6. This is the process of gaining unauthorized access into a computer system or data belonging to someone else. Types range from outside parties who hack into a computer network to phishing programs which give users a false sense of security, prompting them to divulge sensitive information.
  • 7. 2. ELECTRONIC FUNDS TRANSFER FRAUD
  • 8. Electronic funds transfer systems have begun to be exploited, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.
  • 10. There are many others like: THEFT OF TELECOMMUNICATIONS SERVICES COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES TELECOMMUNICATIONS PIRACY ELECTRONIC MONEY LAUNDERING AND TAX EVASION E.T.C
  • 11.
  • 13. THE EFFECTS The effects may vary from: Loss Of Revenue Wasted Time Damaged Reputations Reproduced Productivity
  • 14. LOSS OF REVENUE One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site
  • 15. WASTED TIME Another major effect or consequence of cyber crime is the time that is wasted when an IT personnel devotes great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large
  • 16. DAMAGED REPUTATIONS In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators
  • 17. REDUCED PRODUCTIVITY Due to the measures that many companies must implement to stabilize cyber crime, there is often a negative effect on employees' productivity. This is due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do
  • 18. So far, we have seen that, cybercrimes are done through computer networks, which enable hackers to get ones personal information (hacking) and use it for illegal activities. Let’s have a look at how to prevent cybercrimes.
  • 19. PREVENTION Secure your computer •Activate your firewall •Use anti-virus software •Block spyware attacks •Keep your system updated  Protect your E-identity
  • 20. CALL FOR HELP If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police.
  • 21. EDUCATION Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals.
  • 22. CLICK WITH CAUTION •When you’re on internet, be careful not to click on any link in messages from people you don’t know. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates
  • 23. PRACTICE SAFE SHOPPING Be cautious when shopping at a site that you’ve never visited before and do a little investigation before you enter your payment information.
  • 24. BE CAREFUL ON WI-FI Laptops and phones both ‘remember’ Wi-Fi networks which they have ‘used’ – so hackers can use this to break in. Avoid conducting financial or corporate transactions on public networks. Also, Wi-Fi (wireless) networks at
  • 25. USE STRONG PASSWORDS Although it may be easier for you to remember short passwords, strong passwords can go a long way in helping secure your information, so choose a password that consists of a combination of letters, numbers and special characters and
  • 26.
  • 27. COMMANDMENTS ON CYBERCRIME •I will not share personal data with whomsoever it may be, unless known. •I will never meet someone in person with whom i come across online. •I will not post or download inappropriate files on the internet. •I will not share my password with anyone.
  • 28. COMMANDMENTS ON CYBERCRIME •I will not do any bank transactions on public Wi-Fi as it may subject to banking fraud. •I will not click on any unknown links as they may contain harmful viruses.
  • 29. THE END Presented By Chaitali Ebito Tega Emaediong Oscar ICT Coordinator - Mohan Robert Homeroom Teacher - Emmanuel Isong ICT Support - Caleb

Editor's Notes

  1. Also look at the address bar to see if the site starts with “https://” instead of “http://” as this is another way to see if the site uses encryption.
  2. 10 characters long