SlideShare a Scribd company logo
PLEASE TAKE OUT YOUR
DEVICES AND ACCESS
KAHOOT.IT
THE DANGERS OF
COMPUTER CRIME
WHAT IS COMPUTER CRIME
• ALTERNATIVELY REFERRED TO AS CYBER CRIME, E-CRIME, ELECTRONIC CRIME,
OR HI-TECH CRIME. COMPUTER CRIMES AN ACT PERFORMED BY A
KNOWLEDGEABLE COMPUTER USER, SOMETIMES REFERRED TO AS
A HACKER THAT ILLEGALLY BROWSES OR STEALS A COMPANY'S OR INDIVIDUAL'S
PRIVATE INFORMATION. IN SOME CASES, THIS PERSON OR GROUP OF
INDIVIDUALS MAY BE MALICIOUS AND DESTROY OR OTHERWISE CORRUPT THE
COMPUTER OR DATA FILES.
COMPUTER CRIME
• IT CAN BE SEEN AS TWO WAYS, WHERE A COMPUTER SYSTEMS IS THE TARGET OF
THE CRIME (E.G HACKING)
• WHERE COMPUTER TECHNOLOGY IS USED TO ENABLE OR COMMIT CRIME
TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
PHISHING
THE FRAUDULENT PRACTICE OF
SENDING EMAILS PURPORTING TO
BE FROM REPUTABLE COMPANIES IN
ORDER TO INDUCE INDIVIDUALS TO
REVEAL PERSONAL INFORMATION,
SUCH AS PASSWORDS AND CREDIT
CARD NUMBERS.
BOTS
A ROBOT THAT HAS BEEN
COMPROMISED (OR INFECTED) AND
CAN BE CONTROLLED REMOTELY
WHEN IT IS ON AND CONNECT TO
THE INTERNAT .
A BOT CAN ALSO BE CALLED A
ZOMBIE.
COMPUTER VIRUS
A COMPUTER VIRUS IS MALWARE
THAT IS WRITTEN TO DISRUPT THE
NORMAL FUNCTIONING OF A
PERSONS COMPUTER, WITH OUT
THEIR KNOWLEDGE OR CONSENT.
IT CAN BE USED TO TURN YOUR
COMPUTER INTO A BOT
TECHNIQUES AND TOOLS USED TO COMMIT
COMPUTER CRIME
Spoofing
COMPUTER
WORM
SPYWARE
KEY
BLOG
GER
TROJA
N
CATERGORIES OF COMPUTER CRIME
HARRASMENT
WHEN YOU ARE CONINOUSLY
BOTHERED WITH MASSEGES OR
DATA THAT YOU DO NOT WANT TO
RECEIVE.
OR DATA WHICH SPREADS FALSE OR
POTENTIALLY HARMFUL
INFORMATION ABOUT YOU TO
OTHERS
CYBER ATTACKS
IS AN ATTACK TO THE
INFRUSTRUCTURE OF THE WEB
ITSELF. E.G.
*BUSINESS CYBER ATTACKS THAT
CAUSES PROBLEMS WITH
CONDUCTING BUSINESS ONLINE.
*WEBSITE CYBER ATTACKS.
CATERGORIES OF COMPUTER CRIME
COMPUTERS AND THEFT
BANDWIDTH
DEFINED AS THE AMOUNT OF
DATA THAT CAN BE TRANSMITTED
IN A FIXED AMOUNT OF TIME.
IDENTITY THEFT
THE FRAUDULENT ACQUISITION
AND USE OF A PERSON'S PRIVATE
IDENTIFYING INFORMATION,
USUALLY FOR FINANCIAL GAIN.
MONEY
MONEY IS USUALLY STOLEN BY
USING ONE OF THE METHODS WE
HAVE DESCRIBED, WHICH IS TO GET
CONFIDENTIAL INFORMATION THAT
ALLOWS ACCESS TO BANKS
ACCOUNTS OF A BUSINESS OR AN
INDIVIDUAL.
COPY RIGHTED
MATERIAL
PROTECTION FROM COMPUTER CRIME
ASSUME NOTHING
DON’T ASSUME YOU ARE SAFE AND
PROTECTED AND DON’T ASSUME
THAT THE STRANGER SENDING
YOU THE EMAIL IS WHO OR WHAT
THEY SAY THEY ARE
BELIEVE IN NO ONE
CHECK UP ON THE PEOPLE YOU ARE
INTERACTING WITH, FOR EXAMPLE,
IS THE PERSON ASKING FOR YOUR
PASSWORD TO FIX YOUR
COMPUTER IS AN ICT/IT SPECIALIST
OR SOMEONE ELSE
CHECK EVERYTHING
BAD SPELLING AND GRAMMER AND
INCORRECT WESITES URLS ARE
THINGS THAT YOU CAN CHECK TO
DECIDE IF AN EMAIL TO A WEBSITE
IS LEGITE OR BELIEVABLE
A
B
C
SOFTWARE YOU NEED TO HELP YOU PROTECT YOUR
COMPUTER
ANTI-VIRUS SOFTWARE IS A
PROGRAM OR SET OF PROGRAMS
THAT ARE DESIGNED TO PREVENT,
SEARCH FOR, DETECT, AND
REMOVE SOFTWARE VIRUSES, AND
OTHER MALICIOUS SOFTWARE LIKE
WORMS, TROJANS, ADWARE, AND
MORE.
IS A NETWORK SECURITY SYSTEM
DESIGNED TO PREVENT
UNAUTHORIZED ACCESS TO OR
FROM A PRIVATE
NETWORK. FIREWALLS CAN BE
IMPLEMENTED AS BOTH HARDWARE
ANDSOFTWARE, OR A
COMBINATION OF BOTH
TYPE OF SOFTWARE THAT IS
DESIGNED TO DETECT AND REMOVE
UNWANTED SPYWARE
PROGRAMS. SPYWARE IS A TYPE OF
MALWARE THAT IS INSTALLED ON A
COMPUTER WITHOUT THE USER'S
KNOWLEDGE IN ORDER TO COLLECT
INFORMATION ABOUT THEM.
ANTI-VIRUS SOFTWARE FIREWALL SOFTWARE ANTI-SPY SOFTWARE

More Related Content

What's hot

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
madhu190
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Milap Oza
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
Hamza Khalid
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
Deepak Kumar (D3)
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
Cyber laws
Cyber lawsCyber laws
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
rashidirazali
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
asimoly1141
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
shanueduthoughts
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 

What's hot (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 

Similar to Dangers of Computer devices

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
guest3151b0
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Name parul
Name parulName parul
Name parul
Parul231
 
Name parul
Name parulName parul
Name parul
Parul231
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
chandutidake
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 

Similar to Dangers of Computer devices (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Social engineering
Social engineering Social engineering
Social engineering
 
cyber crime
cyber crimecyber crime
cyber crime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Information security
Information securityInformation security
Information security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 

Dangers of Computer devices

  • 1. PLEASE TAKE OUT YOUR DEVICES AND ACCESS KAHOOT.IT
  • 3. WHAT IS COMPUTER CRIME • ALTERNATIVELY REFERRED TO AS CYBER CRIME, E-CRIME, ELECTRONIC CRIME, OR HI-TECH CRIME. COMPUTER CRIMES AN ACT PERFORMED BY A KNOWLEDGEABLE COMPUTER USER, SOMETIMES REFERRED TO AS A HACKER THAT ILLEGALLY BROWSES OR STEALS A COMPANY'S OR INDIVIDUAL'S PRIVATE INFORMATION. IN SOME CASES, THIS PERSON OR GROUP OF INDIVIDUALS MAY BE MALICIOUS AND DESTROY OR OTHERWISE CORRUPT THE COMPUTER OR DATA FILES.
  • 4. COMPUTER CRIME • IT CAN BE SEEN AS TWO WAYS, WHERE A COMPUTER SYSTEMS IS THE TARGET OF THE CRIME (E.G HACKING) • WHERE COMPUTER TECHNOLOGY IS USED TO ENABLE OR COMMIT CRIME
  • 5. TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIME PHISHING THE FRAUDULENT PRACTICE OF SENDING EMAILS PURPORTING TO BE FROM REPUTABLE COMPANIES IN ORDER TO INDUCE INDIVIDUALS TO REVEAL PERSONAL INFORMATION, SUCH AS PASSWORDS AND CREDIT CARD NUMBERS. BOTS A ROBOT THAT HAS BEEN COMPROMISED (OR INFECTED) AND CAN BE CONTROLLED REMOTELY WHEN IT IS ON AND CONNECT TO THE INTERNAT . A BOT CAN ALSO BE CALLED A ZOMBIE. COMPUTER VIRUS A COMPUTER VIRUS IS MALWARE THAT IS WRITTEN TO DISRUPT THE NORMAL FUNCTIONING OF A PERSONS COMPUTER, WITH OUT THEIR KNOWLEDGE OR CONSENT. IT CAN BE USED TO TURN YOUR COMPUTER INTO A BOT
  • 6. TECHNIQUES AND TOOLS USED TO COMMIT COMPUTER CRIME Spoofing COMPUTER WORM SPYWARE KEY BLOG GER TROJA N
  • 7. CATERGORIES OF COMPUTER CRIME HARRASMENT WHEN YOU ARE CONINOUSLY BOTHERED WITH MASSEGES OR DATA THAT YOU DO NOT WANT TO RECEIVE. OR DATA WHICH SPREADS FALSE OR POTENTIALLY HARMFUL INFORMATION ABOUT YOU TO OTHERS CYBER ATTACKS IS AN ATTACK TO THE INFRUSTRUCTURE OF THE WEB ITSELF. E.G. *BUSINESS CYBER ATTACKS THAT CAUSES PROBLEMS WITH CONDUCTING BUSINESS ONLINE. *WEBSITE CYBER ATTACKS.
  • 9. COMPUTERS AND THEFT BANDWIDTH DEFINED AS THE AMOUNT OF DATA THAT CAN BE TRANSMITTED IN A FIXED AMOUNT OF TIME. IDENTITY THEFT THE FRAUDULENT ACQUISITION AND USE OF A PERSON'S PRIVATE IDENTIFYING INFORMATION, USUALLY FOR FINANCIAL GAIN. MONEY MONEY IS USUALLY STOLEN BY USING ONE OF THE METHODS WE HAVE DESCRIBED, WHICH IS TO GET CONFIDENTIAL INFORMATION THAT ALLOWS ACCESS TO BANKS ACCOUNTS OF A BUSINESS OR AN INDIVIDUAL. COPY RIGHTED MATERIAL
  • 10. PROTECTION FROM COMPUTER CRIME ASSUME NOTHING DON’T ASSUME YOU ARE SAFE AND PROTECTED AND DON’T ASSUME THAT THE STRANGER SENDING YOU THE EMAIL IS WHO OR WHAT THEY SAY THEY ARE BELIEVE IN NO ONE CHECK UP ON THE PEOPLE YOU ARE INTERACTING WITH, FOR EXAMPLE, IS THE PERSON ASKING FOR YOUR PASSWORD TO FIX YOUR COMPUTER IS AN ICT/IT SPECIALIST OR SOMEONE ELSE CHECK EVERYTHING BAD SPELLING AND GRAMMER AND INCORRECT WESITES URLS ARE THINGS THAT YOU CAN CHECK TO DECIDE IF AN EMAIL TO A WEBSITE IS LEGITE OR BELIEVABLE A B C
  • 11. SOFTWARE YOU NEED TO HELP YOU PROTECT YOUR COMPUTER ANTI-VIRUS SOFTWARE IS A PROGRAM OR SET OF PROGRAMS THAT ARE DESIGNED TO PREVENT, SEARCH FOR, DETECT, AND REMOVE SOFTWARE VIRUSES, AND OTHER MALICIOUS SOFTWARE LIKE WORMS, TROJANS, ADWARE, AND MORE. IS A NETWORK SECURITY SYSTEM DESIGNED TO PREVENT UNAUTHORIZED ACCESS TO OR FROM A PRIVATE NETWORK. FIREWALLS CAN BE IMPLEMENTED AS BOTH HARDWARE ANDSOFTWARE, OR A COMBINATION OF BOTH TYPE OF SOFTWARE THAT IS DESIGNED TO DETECT AND REMOVE UNWANTED SPYWARE PROGRAMS. SPYWARE IS A TYPE OF MALWARE THAT IS INSTALLED ON A COMPUTER WITHOUT THE USER'S KNOWLEDGE IN ORDER TO COLLECT INFORMATION ABOUT THEM. ANTI-VIRUS SOFTWARE FIREWALL SOFTWARE ANTI-SPY SOFTWARE