SlideShare a Scribd company logo
1 of 17
ONLINE CRIMES AND HAZARD
ONLINE CRIMES AND HAZARDS
• HACKING
• VIRUSES
• SPAMMING
• FRAUD AND SCAMS
• CYBER STALKING
HACKING
Hacking is unauthorized use of someone else's computer or online account. E-
mail hacking is one of the most common types of online hacking because it is
where most information on a user's online accounts can be found. Once a
hacker is able to enter your e-mail account, he or she would be ableto view
your personal information and access your other online accounts, giving him
the power to do unauthorized transactions or activities through your account.
There are many ways for hacking to happen. For one, if anyone has access to
a computer you are using, it's easy to install a keystroke logger (keylogger)
software, a program which allows the hacker to know everything you type, such
as passwords. Hackers can also use trial and error in the input of passwords,
relying on personal information they know about you such as birthdays or
names of loved ones. Viruses can also be used to get into your computer to
harvest information. Furthermore, there are many professional hackers online
whom people pay to hack any account. The first step for you to get hacked is to
be irresponsible in taking safety measures. The good news is that there are
many ways to lessen the risk of your computer or accounts from getting
hacked. Below are some of them
HACKING
• Use a password that is a combination of letters and numbers
in any online account you have. Never use personal
information as your password.
• Make sure you have a strong anti-virus or firewall program installed and
running on your computer.
• Never click on suspicious links in e-mail or download attachments you did
not expect to receive.
• As much as possible, don't give anyone access to your computer, or open
your account in someone else's personal computer
• Avoid keeping important accounts data in your e-mail inbox
• Be careful what you post and answer in your social networks. Many hackers
today use personal information posted on social networks to hack accounts
VIRUSES
As mentioned earlier, hacking can also occur through computer viruses. A computer virus is a
computer program that spreads from one computer to another computer and interferes with
computer operation. If your computer is infected with a virus, it can corrupt or delete any data you
have stored or even delete everything on your hard disk. Viruses are commonly spread through
attachments in e-mail messages, links in instant messages, or through files and programs you
download online.
Three of the most common types of computer virus are trojans, worms, and e-mail viruses. A trojan
is a computer program that appears to be an interesting or familiar application, file, or e-mail
attachment, but is only masquerading as such or hiding malware that causes damage when you
click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks
your browsing habits, but in severe cases may even cause your computer from functioning properly.
The sneaky nature of trojans allows them to enter the victim's computer undetected, but once in,
they can be a nuisance, frequently making their presence known.
A worm is a small piece of software that uses computer networks and security flaws to replicate
itself. More complex than trojans (although they can be brought in by one), worms usually attack
multi-user systems and can spread over a network of computers through e-mail circulation.
An e-mail virus spreads as an attachment to e-mail messages and replicates itself by automatically
mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't
even require you to double-click as they automatically launch when you preview an e-mail message
VIRUSES
Unsure if your computer has been infected by a virus? What follows are some
common signs of virus infection.
• Your computer runs slower than it used to be.
• Programs and applications take longer to load and sometimes refresh on
their own or disappear from the taskbar.
• Certain files and data are deleted.
• Unusual files or directories appear on your system.
• Disk space and file names change for no reason.
• Strange text, images, and messages appear on your screen.
• Your computer shuts down unexpectedly or crashes frequently.
VIRUSES
DID YOU KNOW!!
Two of the most controversial viruses in the history of the Internet are the Melissa
virus and the ILOVEYOU virus.
The Melissa virus spread in March of 1999 through Microsoft Word documents sent
via e-mail. The virus started in a Word document which was uploaded to an Internet
newsgroup. The virus was triggered whenever anyone downloaded the document.
It would send the infected document in an e-mail message to the first 50 people of
the person's address book. The e-mail message comes in a form of a friendly note
which included the person's name, making it look personalized and harmless. Once
opened again, the virus would create 50 new messages from the recipient's
machine. The Melissa virus gave a number of large companies no choice but to
shut down their e-mail systems.
The ILOVEYOU virus appeared in May 2000 and contained a piece of code as an
attachment. Anyone who clicked on the attachment launched the code, which would
send copies of itself to everyone in the victim's address book and corrupt files on
the victim's machine.
SPAMMING
A spam is the electronic equivalent of junk mail. Spamming is flooding message
accounts over the Internet with copies of the same message, mostly to
advertise, campaign something, and distribute jokes or words of wisdom to a lot
of people at the same time. Spam costs very little to send, hence "spammers"
use this method to advertise their products, services, or schemes to as many
people as possible. Below are some of the most common types of spam and
their definitions
SPAMMING
TYPES OF SPAM DESCRIPTION
E-MAIL SPAM Junk mail or unsolicited commercial e-mail
INSTANT MESSAGING SPAM
Also called spim, instant messaging sends unsolicited
messages and links to millions of users through advanced
software
ONLINE GAME MESSAGING
SPAM
All forms of message flooding in chat rooms, public
discussion areas, and private messaging functions of online
games
SEARCH ENGINE SPAM
Spam sent via black hat or questionable search engine
optimization techniques to increase chances of ranking high
in search engines
BLOG AND GUESTBOOK
SPAM
Template messages repeatedly posted in the comment
sections and guest books of blogs and websites
SPAMMING
TYPES OF SPAM DESCRIPTION
VIDEO SITE SPAM
Messages posted with enticing text and images, usually
promising videos of a sexually suggestive nature, to random
users' online profile
VIRUS SPAM
Spam automatically received from someone else's computer,
usually through an e-mail message, or the kind that opens
with a type of file
FRAUDS AND SCAMS
There are many variations of frauds and scams on the Internet created by fake
sellers who use computer services to promote bogus services products, and
investment opportunities, among others. The common goal is to fool you into
giving away money and/or bank information. But you have to find a balance
berween caution and adopting a go-for-it attitude. The overly cautious trait of
people can actually prevent them from finding new legitimate opportunities. Not
everything suspicious you encounter on the Internet is a scam. Some are
actually worthwhile checking out.
FRAUDS AND SCAMS
What follows is a list of guidelines to give you a nose for online frauds or
scams:
1. If something is too good to be true, then most likely it is.
If a certain site says you can get an unbelievably large amount of money
quickly with the least effort or investment, then it is likely bogus as no such kind
of business opportunity exists in the real world. Indeed, such offers will
generate big money quickly, but only for the scammer and not for you!
Legitimate offers are usually those that come from companies that have been in
the business for a long time, promise reasonable returns, have other financial
interests, and have earned credibility with members through the years.
2. Be wary of products that are offered too cheap.
If a certain product is offered too cheap than usual, don't rush into buying as
there may be a catch, particularly if the product is a physical object and not just
a digital file that can be downloaded.
FRAUDS AND SCAMS
3. Be cautious of buyers or sellers who have insufficient contact
information provided on their sites.
Legitimate and certified businesses are registered and often provide complete
contact information such as phone numbers, office location, and e-mail
addresses. They also have well-written copy in English. Petry scammers often
work alone (or with a handful of cronies), are often careless (in spite of their
technical know-how), write poorly, and design pages hastily with little regard for
taste or the target customers.
4. Research will go a long way.
Just because a seller has logos of affiliations or certifications from "credible
organizations" doesn't mean you can already trust it outright. These so-called
credentials are not assurances you will not be duped. Check to see if those
organizations indeed exist. Check for any feedback on the company and try
calling or e-mailing support. Verify the seller's street address, zip codes, and
other posted information.
FRAUDS AND SCAMS
ONLINE FRAUD/SCAM DESCRIPTION
GET RICH OR DEPOSIT
SCAMS
Scams that generally ask you to send money as "initial
deposit" which allow you to earn much more
PHISHING E-MAIL AND
WEBSITE SCAMS
E-mails and websites that resemble legitimate credit or bank
authorities. They will frighten you into visiting a phony
webpage (e.g., by saying there is a problem with your bank
account). Once you visit the phony website, it will ask you to
enter your ID and password. Information you enter is
intercepted by the scammers who will later access your
account.
WINNER OR CLAIM SCAM
All forms of message flooding in chat rooms, E-mail saying
you've won, inherited, or are the recipient of something
great (such as a huge amount of money) and you have to
send a claim fee and/or provide your bank details for shipping
and handling costs public discussion areas, and private
messaging functions of online games
SPAMMING
ONLINE FRAUD/SCAM DESCRIPTION
CREDIT CARD SCAM
Incredible offers of advanced fees paid for a guaranteed loan or
credit card
AUCTION FRAUD
You never get the product promised or bid on; the promises don't
match the product you actually received
EMPLOYMENT SCAM
Bogus job offers asking you to provide your personal data such as
bank account information or work samples so you can get started or
paid upfront
LOTTERY SCAM
Intriguing e-mails saying you won a huge amount of money and that
you must pay the processing fee to collect your winnings
TRAVEL SCAM
E-mail with the offer of an amazing low airfare to an exotic
destination and you must book immediately because the offer
expires immediately. The truth is, the airfare is free or low but hotel
rates are highly overpriced. Some offer rock-bottom prices but hide
high fees.
DISASTER RELIEF SCAM
Fake charity websites that ask people to donate money for the
victims of disasters such as tsunamis and hurricanes
CYBER STALKING
Cyber stalking is the use of the Internet by an individual or a group of individuals to
harass another individual, group of individuals, or organization. Cyber stalking can
involve threats, identity theft, false accusations, solicitation of minors for sexual
purposes, and gathering of information for harassment purposes. Cyber stalkers
often meet or target their victims through search engines, online forums, bulletin
boards, chat rooms, and social networks. They attempt to track or follow the victim's
Internet activity. They can also post derogatory statements about their stalking
target on websites to harass the victim. Victims of cyber stalking may not even
know they are being stalked. Cyber stalking can disrupt the lives of victims and
cause a lot of fear and a feeling of being threatened.
Cyber stalking can affect both young and old and is often perpetrated by predators
or stalkers. Stalkers can be located on the opposite side of the world or be close by
in the same neighborhood or room. Stalkers can also be of either sex, but over 75%
of the victims are females. Cyber stalking is not just threatening but also dangerous
because it can lead to serious offline harassment.
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS

More Related Content

Similar to TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxMarlynLiagao
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environmentJeet Kothadiya
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 

Similar to TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS (20)

IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 

Recently uploaded

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS

  • 2. ONLINE CRIMES AND HAZARDS • HACKING • VIRUSES • SPAMMING • FRAUD AND SCAMS • CYBER STALKING
  • 3. HACKING Hacking is unauthorized use of someone else's computer or online account. E- mail hacking is one of the most common types of online hacking because it is where most information on a user's online accounts can be found. Once a hacker is able to enter your e-mail account, he or she would be ableto view your personal information and access your other online accounts, giving him the power to do unauthorized transactions or activities through your account. There are many ways for hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a keystroke logger (keylogger) software, a program which allows the hacker to know everything you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying on personal information they know about you such as birthdays or names of loved ones. Viruses can also be used to get into your computer to harvest information. Furthermore, there are many professional hackers online whom people pay to hack any account. The first step for you to get hacked is to be irresponsible in taking safety measures. The good news is that there are many ways to lessen the risk of your computer or accounts from getting hacked. Below are some of them
  • 4. HACKING • Use a password that is a combination of letters and numbers in any online account you have. Never use personal information as your password. • Make sure you have a strong anti-virus or firewall program installed and running on your computer. • Never click on suspicious links in e-mail or download attachments you did not expect to receive. • As much as possible, don't give anyone access to your computer, or open your account in someone else's personal computer • Avoid keeping important accounts data in your e-mail inbox • Be careful what you post and answer in your social networks. Many hackers today use personal information posted on social networks to hack accounts
  • 5. VIRUSES As mentioned earlier, hacking can also occur through computer viruses. A computer virus is a computer program that spreads from one computer to another computer and interferes with computer operation. If your computer is infected with a virus, it can corrupt or delete any data you have stored or even delete everything on your hard disk. Viruses are commonly spread through attachments in e-mail messages, links in instant messages, or through files and programs you download online. Three of the most common types of computer virus are trojans, worms, and e-mail viruses. A trojan is a computer program that appears to be an interesting or familiar application, file, or e-mail attachment, but is only masquerading as such or hiding malware that causes damage when you click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks your browsing habits, but in severe cases may even cause your computer from functioning properly. The sneaky nature of trojans allows them to enter the victim's computer undetected, but once in, they can be a nuisance, frequently making their presence known. A worm is a small piece of software that uses computer networks and security flaws to replicate itself. More complex than trojans (although they can be brought in by one), worms usually attack multi-user systems and can spread over a network of computers through e-mail circulation. An e-mail virus spreads as an attachment to e-mail messages and replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require you to double-click as they automatically launch when you preview an e-mail message
  • 6. VIRUSES Unsure if your computer has been infected by a virus? What follows are some common signs of virus infection. • Your computer runs slower than it used to be. • Programs and applications take longer to load and sometimes refresh on their own or disappear from the taskbar. • Certain files and data are deleted. • Unusual files or directories appear on your system. • Disk space and file names change for no reason. • Strange text, images, and messages appear on your screen. • Your computer shuts down unexpectedly or crashes frequently.
  • 7. VIRUSES DID YOU KNOW!! Two of the most controversial viruses in the history of the Internet are the Melissa virus and the ILOVEYOU virus. The Melissa virus spread in March of 1999 through Microsoft Word documents sent via e-mail. The virus started in a Word document which was uploaded to an Internet newsgroup. The virus was triggered whenever anyone downloaded the document. It would send the infected document in an e-mail message to the first 50 people of the person's address book. The e-mail message comes in a form of a friendly note which included the person's name, making it look personalized and harmless. Once opened again, the virus would create 50 new messages from the recipient's machine. The Melissa virus gave a number of large companies no choice but to shut down their e-mail systems. The ILOVEYOU virus appeared in May 2000 and contained a piece of code as an attachment. Anyone who clicked on the attachment launched the code, which would send copies of itself to everyone in the victim's address book and corrupt files on the victim's machine.
  • 8. SPAMMING A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise their products, services, or schemes to as many people as possible. Below are some of the most common types of spam and their definitions
  • 9. SPAMMING TYPES OF SPAM DESCRIPTION E-MAIL SPAM Junk mail or unsolicited commercial e-mail INSTANT MESSAGING SPAM Also called spim, instant messaging sends unsolicited messages and links to millions of users through advanced software ONLINE GAME MESSAGING SPAM All forms of message flooding in chat rooms, public discussion areas, and private messaging functions of online games SEARCH ENGINE SPAM Spam sent via black hat or questionable search engine optimization techniques to increase chances of ranking high in search engines BLOG AND GUESTBOOK SPAM Template messages repeatedly posted in the comment sections and guest books of blogs and websites
  • 10. SPAMMING TYPES OF SPAM DESCRIPTION VIDEO SITE SPAM Messages posted with enticing text and images, usually promising videos of a sexually suggestive nature, to random users' online profile VIRUS SPAM Spam automatically received from someone else's computer, usually through an e-mail message, or the kind that opens with a type of file
  • 11. FRAUDS AND SCAMS There are many variations of frauds and scams on the Internet created by fake sellers who use computer services to promote bogus services products, and investment opportunities, among others. The common goal is to fool you into giving away money and/or bank information. But you have to find a balance berween caution and adopting a go-for-it attitude. The overly cautious trait of people can actually prevent them from finding new legitimate opportunities. Not everything suspicious you encounter on the Internet is a scam. Some are actually worthwhile checking out.
  • 12. FRAUDS AND SCAMS What follows is a list of guidelines to give you a nose for online frauds or scams: 1. If something is too good to be true, then most likely it is. If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment, then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and have earned credibility with members through the years. 2. Be wary of products that are offered too cheap. If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the product is a physical object and not just a digital file that can be downloaded.
  • 13. FRAUDS AND SCAMS 3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites. Legitimate and certified businesses are registered and often provide complete contact information such as phone numbers, office location, and e-mail addresses. They also have well-written copy in English. Petry scammers often work alone (or with a handful of cronies), are often careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the target customers. 4. Research will go a long way. Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support. Verify the seller's street address, zip codes, and other posted information.
  • 14. FRAUDS AND SCAMS ONLINE FRAUD/SCAM DESCRIPTION GET RICH OR DEPOSIT SCAMS Scams that generally ask you to send money as "initial deposit" which allow you to earn much more PHISHING E-MAIL AND WEBSITE SCAMS E-mails and websites that resemble legitimate credit or bank authorities. They will frighten you into visiting a phony webpage (e.g., by saying there is a problem with your bank account). Once you visit the phony website, it will ask you to enter your ID and password. Information you enter is intercepted by the scammers who will later access your account. WINNER OR CLAIM SCAM All forms of message flooding in chat rooms, E-mail saying you've won, inherited, or are the recipient of something great (such as a huge amount of money) and you have to send a claim fee and/or provide your bank details for shipping and handling costs public discussion areas, and private messaging functions of online games
  • 15. SPAMMING ONLINE FRAUD/SCAM DESCRIPTION CREDIT CARD SCAM Incredible offers of advanced fees paid for a guaranteed loan or credit card AUCTION FRAUD You never get the product promised or bid on; the promises don't match the product you actually received EMPLOYMENT SCAM Bogus job offers asking you to provide your personal data such as bank account information or work samples so you can get started or paid upfront LOTTERY SCAM Intriguing e-mails saying you won a huge amount of money and that you must pay the processing fee to collect your winnings TRAVEL SCAM E-mail with the offer of an amazing low airfare to an exotic destination and you must book immediately because the offer expires immediately. The truth is, the airfare is free or low but hotel rates are highly overpriced. Some offer rock-bottom prices but hide high fees. DISASTER RELIEF SCAM Fake charity websites that ask people to donate money for the victims of disasters such as tsunamis and hurricanes
  • 16. CYBER STALKING Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false accusations, solicitation of minors for sexual purposes, and gathering of information for harassment purposes. Cyber stalkers often meet or target their victims through search engines, online forums, bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet activity. They can also post derogatory statements about their stalking target on websites to harass the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can disrupt the lives of victims and cause a lot of fear and a feeling of being threatened. Cyber stalking can affect both young and old and is often perpetrated by predators or stalkers. Stalkers can be located on the opposite side of the world or be close by in the same neighborhood or room. Stalkers can also be of either sex, but over 75% of the victims are females. Cyber stalking is not just threatening but also dangerous because it can lead to serious offline harassment.