SlideShare a Scribd company logo
CYBERCRIME
 Cyber crime encompasses any criminal act
dealing with computers
and networks (called hacking). Additionally, cyber
crime also includes traditional crimes conducted
through the Internet. For example; hate crimes,
telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to
be cyber crimes when the illegal activities are
committed through the use of a computer and
the Internet.
TYPES OF CYBERCRIME (I)
TYPES OF CYBERCRIME (II)
HACKING
 The process to attempting to gain or
succesfully gaining, unauthorized access
to computer resources.
WHO IS A HACKER?
 In the computer security context,a hacker
is someone who seeks and exploits
weaknesses in a computer system or a
computer network.
 The term hacker is reclaimed by computer
programmers who argue that someone
breaking into computers is better called a
cracker.
TYPES OF HACKING
 Website hacking
 Network hacking
 Ethical hacking
 Email hacking
 Password hacking
 Online banking hacking
 Computer hacking
IDENTITY THEFT
 Identity theft happens when someone
steals your personal information and uses
it without your permission. It’s a serious
crime that can wreak havoc with your
finances, credit history, and reputation and
can take time, money, and patience to
resolve.
SPECIFIC TYPES OF IDENTITY
THEFT
 Tax-Related Identity Theft
 Child Identity Theft
 Medical Identity Theft
HOW TO PREVENT IDENTITY THEFT
MALICIOUS SOFTWARE
 Malicious software, commonly known as
malware, is any software designed to
cause harm to a computer and user.
TYPES OF MALWARE
 Worms
 Viruses
 Adware
 Trojans
 Spyware
 Rootkits
HOW TO AVOID MALWARE?
 Anti-malware
 Anti-virus
 Firewall
Cyberstalking
 Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual,
a group, or an organization.
 It may include:
 false accusations, defamation, slander and libel.
It may also include monitoring, identity theft,
threats, vandalism, solicitation for sex,
or gathering information that may be used to
threaten or harass.
STATE CYBERSTALKING
AND CYBERHARASSMENT LAWS
 States have enacted "cyberstalking" or
"cyberharassment" laws or have laws that
explicitly include electronic forms of
communication within more traditional stalking or
harassment laws. This chart identifies state laws
that include specific references to electronic
communication.
THEFT
 theft is the taking of another
person's property without that person's
permission or consent with the intent to
deprive the rightful owner of it. The word is
also used as an informal shorthand term
for some crimes against property.
 A few years ago people saw the huge potential of
the internet for commiting dishonest acts as child
abuse and soliciting.
 Child abuse is the physical, sexual or emotional
maltreatment or neglect of a child or children
 Online predators are people who commit child
sexual abuse that begins or takes place on
the Internet.
Child abuse and soliciting
 Internet-initiated sex crimes against minors involve deceit
and violence, and begin with adult strangers known as
internet predators communicating with children and
young teenagers over the Internet and sometimes then
meeting face to face.
 Online predators use chat rooms, instant
messaging, Internet forums, social networking sites, cell
phones, and even video game consoles
 Most online sex offenders are young adults who target
teens and seduce victims into sexual relationships. They
take time to develop the trust and confidence of teens, so
the teens see these relationships as romances or sexual
adventures.
How does it work? (I)
 Online predators are a very important source of
child pornography.
 A longitudinal study of 341 convicted child
molesters in America found that pornography's
use correlated significantly with their rate of
sexually re-offending. The study says that
watching child pornography can increase
recidivism risk for all groups of child molesters.
How does it work? (II)
 In order to prevent child abuse you should:
 Explain your children the safety rules of the
internet.
 Keep your home computer out in the open.
 Set up an internet protection program on the
computers your children use.
 Tell your children not to give out passwords,
even to a good friend.
How to prevent online child
abuse and soliciting?
BIBLIOGRAPHY
 http://www.techopedia.com/definition/4015/malicious-software-malware
 http://es.slideshare.net/sairanisakoji/hacking-its-types
 www.wikipedia.org/wiki/hacker
 www.wikipedia.org/wiki/hacking
NOMBRES:
 Ángel Giral Arruego
 Javier Corbalán Monserrate
 Víctor Velasco
 Volodhymir Khymera

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vasiliki Zioga
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 

Viewers also liked

Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
Karnika Seth
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
HELEN UBA-UGOCHUKWU
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 

Viewers also liked (9)

Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similar to Power point cybercrime

cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
gaherwarsaloni1234
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
varunbamba
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
ssuser482fec
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 

Similar to Power point cybercrime (20)

cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 

Recently uploaded

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Power point cybercrime

  • 1. CYBERCRIME  Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 4. HACKING  The process to attempting to gain or succesfully gaining, unauthorized access to computer resources.
  • 5. WHO IS A HACKER?  In the computer security context,a hacker is someone who seeks and exploits weaknesses in a computer system or a computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 6. TYPES OF HACKING  Website hacking  Network hacking  Ethical hacking  Email hacking  Password hacking  Online banking hacking  Computer hacking
  • 7. IDENTITY THEFT  Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation and can take time, money, and patience to resolve.
  • 8. SPECIFIC TYPES OF IDENTITY THEFT  Tax-Related Identity Theft  Child Identity Theft  Medical Identity Theft
  • 9. HOW TO PREVENT IDENTITY THEFT
  • 10. MALICIOUS SOFTWARE  Malicious software, commonly known as malware, is any software designed to cause harm to a computer and user.
  • 11. TYPES OF MALWARE  Worms  Viruses  Adware  Trojans  Spyware  Rootkits
  • 12. HOW TO AVOID MALWARE?  Anti-malware  Anti-virus  Firewall
  • 13. Cyberstalking  Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.  It may include:  false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass.
  • 14. STATE CYBERSTALKING AND CYBERHARASSMENT LAWS  States have enacted "cyberstalking" or "cyberharassment" laws or have laws that explicitly include electronic forms of communication within more traditional stalking or harassment laws. This chart identifies state laws that include specific references to electronic communication.
  • 15. THEFT  theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property.
  • 16.  A few years ago people saw the huge potential of the internet for commiting dishonest acts as child abuse and soliciting.  Child abuse is the physical, sexual or emotional maltreatment or neglect of a child or children  Online predators are people who commit child sexual abuse that begins or takes place on the Internet. Child abuse and soliciting
  • 17.  Internet-initiated sex crimes against minors involve deceit and violence, and begin with adult strangers known as internet predators communicating with children and young teenagers over the Internet and sometimes then meeting face to face.  Online predators use chat rooms, instant messaging, Internet forums, social networking sites, cell phones, and even video game consoles  Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. How does it work? (I)
  • 18.  Online predators are a very important source of child pornography.  A longitudinal study of 341 convicted child molesters in America found that pornography's use correlated significantly with their rate of sexually re-offending. The study says that watching child pornography can increase recidivism risk for all groups of child molesters. How does it work? (II)
  • 19.  In order to prevent child abuse you should:  Explain your children the safety rules of the internet.  Keep your home computer out in the open.  Set up an internet protection program on the computers your children use.  Tell your children not to give out passwords, even to a good friend. How to prevent online child abuse and soliciting?
  • 21. NOMBRES:  Ángel Giral Arruego  Javier Corbalán Monserrate  Víctor Velasco  Volodhymir Khymera