11
COMPUTER CRIMES Yessenia Rico Amy Cahill Greta Leos Jacob Cordova

Computer Crimes

Embed Size (px)

DESCRIPTION

Computer Crimes. Yessenia Rico Amy Cahill Greta Leos Jacob Cordova. Computer Crime. Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. Popular Computer Crimes Identity Theft Spam Fraud - PowerPoint PPT Presentation

Citation preview

Page 1: Computer Crimes

COMPUTER CRIMES

Yessenia RicoAmy CahillGreta Leos

Jacob Cordova

Page 2: Computer Crimes

COMPUTER CRIME

•Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware.

Page 3: Computer Crimes

Popular Computer Crimes

•Identity Theft•Spam•Fraud

• Craig's List• MySpace• Pedophiles

Page 4: Computer Crimes

Identity Theft

Involves a person that is pretending to be someone else in order to steal information, money, or anything that they could want from that individual

Statistics 2007-446 data breach incidents 2008 First 9 months-516 data breach incidents 80% of these incidents are related to or

involve digital records Two-thirds of identity theft begins with

email solicitations

Page 5: Computer Crimes

Spam

Spamming is the sending of unsolicitated electronic messages Most spam mail originates from advertisers

looking to push their products further Spamming contributes to other problems also

Identity theft Viruses

Page 6: Computer Crimes

Myspace

Myspace is a computer crime because you can give false identity. Myspace can also generates controversy ranging from rape and murder to child predators and drug dealers.

Myspace is positive in ways as in you can chat with family, Friends who have move away.

Page 7: Computer Crimes

PEDOPHILIA• As a medical diagnosis, it is defined as a psychological disorder in which an adult or older adolescent experiences a sexual preference for prepubescent children.

• The Internet Allows Pedophiles:  Instant access to other predators worldwide;

  Open discussion of their sexual desires;  Shared ideas about ways to lure victims;

  Mutual support of their adult-child sex philosophies;  Instant access to potential child victims worldwide;  Disguised identities for approaching children, even

      to the point of presenting as a member of teen groups;  Ready access to "teen chat rooms" to find out how and who

      to target as potential victims;  Means to identify and track down home contact information;

  Ability to build a long-term "Internet" relationship      with a potential victim, prior to attempting to engage

      the child in physical contact.

Page 8: Computer Crimes

HOW TO AVOID COMPUTER CRIMES!!!

Passwords• Select a GOOD password, try to mix up a combination of characters in a password of only 1,2,3, or 4 characters.• Avoid obvious passwords…example (your name, date of birth, and your nickname).

Personal Information• Don’t give out banking account information unless you know it’s a secured site!!• Never give out your Social Security Number.• Make sure to logout of everything after your done using your computer, that way if someone else uses it they can’t get a hold of your personal info.

Page 9: Computer Crimes

HOW TO AVOID COMPUTER CRIMES!!!

Anti-Virus Protection• Don’t bring disks in from outside

sources. • Scan demo disks and downloaded files

for viruses.

Page 10: Computer Crimes

COMPUTER CRIMES HAPPEN

There is an unfortunate percent that will be victims but you can prevent it from happening by being aware of your actions on the internet.

Page 11: Computer Crimes

http://en.wikipedia.org/wiki/Pedophilia

http://www.mental-health-matters.com/index.php?option=com_content&view=article&id=519http://crime.about.com/od/sex/p/pedophile.htm

http://www.csbsju.edu/uspp/CrimPsych/CPSG-6.htm

http://www.totalbankruptcy.com/