SlideShare a Scribd company logo
Fraud and Identity Theft
 Cybercrime: Any criminal action perpetrated primarily through the use of a computer
 Programs damaging computers
 Stealing identities online
 Attacking corporate websites
 Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime.
 Top categories of complaints
 FBI-related scams
 Identity theft
 Nonauction/nondelivery of merchandise
 Advance fee fraud
 Identity theft: Occurs when a thief steals personal information such as your name, address,
Social Security number, birth date, bank account, and credit card information and runs up debt
in your name
 Acts perpetrated by identity thieves
 Counterfeiting existing credit and debit cards
 Requesting changes of address on bank and credit card statements
 Obtaining new credit cards and bank account in your name and writing bad checks and not paying off
credit card balances
 Obtaining medical services in your name
 Buying a home with a mortgage in your name, then reselling the house
 The victim receives a phone call from
someone who pretends to be a computer
security person.
 The caller tricks the victim into installing
some software to remove some
vulnerability.
 The scammer then uses this software to
gain control and steal information from
the victims computer.
 Other scams: Showmypc.com
 This is a money transfer scam.
 The scammers contact victims by email or letter
and offer to share in a large sum of money that they
want to transfer out of their country.
 They sell the story using the excuse of civil war,
coups, etc. or inheritance that are difficult to access
because of government restrictions or taxes.
 They ask you to pay some money up front to help
with the transfer only to never be heard of again.
 A hacker uses this method try to
get a users to visit links or sites
and enter their information.
 The sites look and feel like legit
sites, but are designed to steal user
information.
 Keep hackers out
 Prevent them from accessing
computer
 Protect your digital information
 Use passwords
 Hide activities from prying eyes
 Firewall: Software program or hardware device designed to protect
computers from hackers
 Personal firewall: Specifically designed for home networks
 Both Windows and OS X include firewalls
 Security suites also include firewall software
 You can also buy and configure hardware firewall devices
 Strong passwords are difficult to guess
 Not easily associated with you (birth date, name
of pet, nickname)
 At least 14 characters, including numbers,
symbols, and upper- and lowercase letters
 Not a single word or a word from a dictionary
 Use a mix of upper- and lowercase letters and
symbols
 Never tell anyone or write down password
 Change password regularly (every month)
 Use different passwords for different websites
 Password strength tests evaluate your passwords
 Password Meter
 Operating systems have built-in password protection
 Windows 8 allows you to use picture passwords
 Current versions of Google Chrome, Firefox,
and Internet Explorer include privacy tools that
help you surf the web anonymously
 Incognito
 Private Browsing
 InPrivate
 Portable privacy devices provide an even higher
level of surfing privacy
 Imation Personal Flash Drive
 Store sensitive Internet files
 Preload Linux OS on a flash drive to avoid using
the public or work computer’s OS
 Third-party software developers offer apps to
enhance tablet security
 hidePad
 Reveal as little information as possible
 Your Social Security number, phone number, date of birth,
and street addresses are four key pieces of information that
identity thieves need to steal an identity. This information
should never be shared in a public area on any website.
 Social networking sites like Facebook make privacy
settings available in your profile settings. If you’ve never
changed your default privacy settings in Facebook, you’re
probably sharing information more widely than you
should.
 Data on your computer faces three major threats
 Unauthorized access
 Tampering
 Destruction
 Backups are copies of files that you can use to replace the
originals If they’re lost or damaged
 Backups must be stored away from where your computer is
located and should be stored in at least two different
places to be truly secure
 Three main choices
 Online (in the cloud)
 External hard drives
 Network-attached storage (NAS)
 The ATM scam involves the use of
information obtained from one’s ATM
cards and stealing from them.
 This form of cybercrime involves the use of
card readers, hidden cameras and burglary
to obtain information on people’s bank
accounts and spin numbers.
 These are used to withdraw cash with
replica cards without the bank’s or the
customer’s knowledge.
 There are several ways in which this crime
can be committed with the cooperation of
the unsuspecting customers.
 Use of Gadgets to read Personal Data
 The criminals may attach false facades on the ATMs set up in unsecure areas to
capture customer’s cards.
 Ghost ATM Machines: Freestanding machines would be set up on busy places
where people may need to withdraw their money more frequently and
unsuspectingly.
 Criminals place cash receptacle machine inside the ATM machine vestibules to
confuse the clients.
 Snatching of the cards from clients
 Four main security concerns with computerized devices
 Keeping them from being stolen
 Keeping data secure in case they are stolen
 Finding a device if it is stolen
 Remotely recovering and wiping data off a stolen device
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall 15
 The methods used in committing cyber frauds and scam keep developing each
and everyday.
 The forms used vary from technological forms
 These crimes can however be prevented by the banks in application of the
latest forms of technology in ensuring safety to client accounts. Application of
high security measures would also be ideal.
 Customers can also help in prevention of the crimes by being watchful of their
surrounding to avoid being tricked or mugged.

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing
PhishingPhishing
Phishing
defquon
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Phishing
PhishingPhishing
Phishing
Kiran Patil
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
Sayali Dayama
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
Marya Sholevar
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
sharmaakash1881
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
Devendra Yadav
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Viewers also liked

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
aaberra
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
aaberra
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
BRITTO EDISON
 
Working Experiences in Amkor Technology
Working Experiences in Amkor TechnologyWorking Experiences in Amkor Technology
Working Experiences in Amkor Technology
Rita Hsiung
 
Real
RealReal
Foshan kangwosi furniture new models
Foshan kangwosi furniture new modelsFoshan kangwosi furniture new models
Foshan kangwosi furniture new models
Ruby Zhang
 
TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07
Evelyn Fox
 
ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)
Ankita Nagane
 
Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise
Metropolitan Touring
 
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin FilmsElectrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
iosrjce
 
Portfolio
PortfolioPortfolio
Portfolio
Rawan Abdulhalim
 
3D modelling process
3D modelling process3D modelling process
3D modelling process
tommyorg
 
2luncheonsale
2luncheonsale2luncheonsale
2luncheonsale
BotoBata
 
30sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp0230sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp02
Fjacobo
 
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
Challenge:Future
 
El aguacate y yo
El aguacate y yoEl aguacate y yo

Viewers also liked (19)

How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
 
Working Experiences in Amkor Technology
Working Experiences in Amkor TechnologyWorking Experiences in Amkor Technology
Working Experiences in Amkor Technology
 
Real
RealReal
Real
 
Foshan kangwosi furniture new models
Foshan kangwosi furniture new modelsFoshan kangwosi furniture new models
Foshan kangwosi furniture new models
 
TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07TCD_Partnering_with_Industry_Brochure_v07
TCD_Partnering_with_Industry_Brochure_v07
 
ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)ResumeAnkitaNagane (1)
ResumeAnkitaNagane (1)
 
Bachlor Of Law
Bachlor Of LawBachlor Of Law
Bachlor Of Law
 
Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise Santa cruz - Galapagos Cruise
Santa cruz - Galapagos Cruise
 
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin FilmsElectrical Properties of Thermally Evaporated In40 Se60 Thin Films
Electrical Properties of Thermally Evaporated In40 Se60 Thin Films
 
Portfolio
PortfolioPortfolio
Portfolio
 
3D modelling process
3D modelling process3D modelling process
3D modelling process
 
2luncheonsale
2luncheonsale2luncheonsale
2luncheonsale
 
30sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp0230sesionesparalainiciacinalftbol 121025040004-phpapp02
30sesionesparalainiciacinalftbol 121025040004-phpapp02
 
Scan
ScanScan
Scan
 
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
[Challenge:Future] T.A.T.: Make.it.WORK - Learning through Projects
 
El aguacate y yo
El aguacate y yoEl aguacate y yo
El aguacate y yo
 

Similar to Lock It Down, Keep It Safe

Cyber crime
Cyber crimeCyber crime
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
Shirley Diniz
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
HaroldCo
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Data theft
Data theftData theft
Data theft
Laura
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
Travis Good
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
SoniaTaryal
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 

Similar to Lock It Down, Keep It Safe (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Data theft
Data theftData theft
Data theft
 
Computer security
Computer securityComputer security
Computer security
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Internet security
Internet securityInternet security
Internet security
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Information security
Information securityInformation security
Information security
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

Lock It Down, Keep It Safe

  • 2.  Cybercrime: Any criminal action perpetrated primarily through the use of a computer  Programs damaging computers  Stealing identities online  Attacking corporate websites  Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime.  Top categories of complaints  FBI-related scams  Identity theft  Nonauction/nondelivery of merchandise  Advance fee fraud
  • 3.  Identity theft: Occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account, and credit card information and runs up debt in your name  Acts perpetrated by identity thieves  Counterfeiting existing credit and debit cards  Requesting changes of address on bank and credit card statements  Obtaining new credit cards and bank account in your name and writing bad checks and not paying off credit card balances  Obtaining medical services in your name  Buying a home with a mortgage in your name, then reselling the house
  • 4.  The victim receives a phone call from someone who pretends to be a computer security person.  The caller tricks the victim into installing some software to remove some vulnerability.  The scammer then uses this software to gain control and steal information from the victims computer.  Other scams: Showmypc.com
  • 5.  This is a money transfer scam.  The scammers contact victims by email or letter and offer to share in a large sum of money that they want to transfer out of their country.  They sell the story using the excuse of civil war, coups, etc. or inheritance that are difficult to access because of government restrictions or taxes.  They ask you to pay some money up front to help with the transfer only to never be heard of again.
  • 6.  A hacker uses this method try to get a users to visit links or sites and enter their information.  The sites look and feel like legit sites, but are designed to steal user information.
  • 7.  Keep hackers out  Prevent them from accessing computer  Protect your digital information  Use passwords  Hide activities from prying eyes
  • 8.  Firewall: Software program or hardware device designed to protect computers from hackers  Personal firewall: Specifically designed for home networks  Both Windows and OS X include firewalls  Security suites also include firewall software  You can also buy and configure hardware firewall devices
  • 9.  Strong passwords are difficult to guess  Not easily associated with you (birth date, name of pet, nickname)  At least 14 characters, including numbers, symbols, and upper- and lowercase letters  Not a single word or a word from a dictionary  Use a mix of upper- and lowercase letters and symbols  Never tell anyone or write down password  Change password regularly (every month)  Use different passwords for different websites  Password strength tests evaluate your passwords  Password Meter  Operating systems have built-in password protection  Windows 8 allows you to use picture passwords
  • 10.  Current versions of Google Chrome, Firefox, and Internet Explorer include privacy tools that help you surf the web anonymously  Incognito  Private Browsing  InPrivate  Portable privacy devices provide an even higher level of surfing privacy  Imation Personal Flash Drive  Store sensitive Internet files  Preload Linux OS on a flash drive to avoid using the public or work computer’s OS  Third-party software developers offer apps to enhance tablet security  hidePad
  • 11.  Reveal as little information as possible  Your Social Security number, phone number, date of birth, and street addresses are four key pieces of information that identity thieves need to steal an identity. This information should never be shared in a public area on any website.  Social networking sites like Facebook make privacy settings available in your profile settings. If you’ve never changed your default privacy settings in Facebook, you’re probably sharing information more widely than you should.
  • 12.  Data on your computer faces three major threats  Unauthorized access  Tampering  Destruction  Backups are copies of files that you can use to replace the originals If they’re lost or damaged  Backups must be stored away from where your computer is located and should be stored in at least two different places to be truly secure  Three main choices  Online (in the cloud)  External hard drives  Network-attached storage (NAS)
  • 13.  The ATM scam involves the use of information obtained from one’s ATM cards and stealing from them.  This form of cybercrime involves the use of card readers, hidden cameras and burglary to obtain information on people’s bank accounts and spin numbers.  These are used to withdraw cash with replica cards without the bank’s or the customer’s knowledge.  There are several ways in which this crime can be committed with the cooperation of the unsuspecting customers.
  • 14.  Use of Gadgets to read Personal Data  The criminals may attach false facades on the ATMs set up in unsecure areas to capture customer’s cards.  Ghost ATM Machines: Freestanding machines would be set up on busy places where people may need to withdraw their money more frequently and unsuspectingly.  Criminals place cash receptacle machine inside the ATM machine vestibules to confuse the clients.  Snatching of the cards from clients
  • 15.  Four main security concerns with computerized devices  Keeping them from being stolen  Keeping data secure in case they are stolen  Finding a device if it is stolen  Remotely recovering and wiping data off a stolen device Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 15
  • 16.  The methods used in committing cyber frauds and scam keep developing each and everyday.  The forms used vary from technological forms  These crimes can however be prevented by the banks in application of the latest forms of technology in ensuring safety to client accounts. Application of high security measures would also be ideal.  Customers can also help in prevention of the crimes by being watchful of their surrounding to avoid being tricked or mugged.

Editor's Notes

  1. Because they’re portable, laptops, tablets, and phones are easy targets for thieves. You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device