9
Discovering God's Creation Science 10-12: Forensics: Crime Scene Investigation 21.5 Taylor Yarborough Computer Based Crime Computer Based Crime

Computer based crime

Embed Size (px)

Citation preview

Discovering God's Creation Science 10-12: Forensics: Crime Scene

Investigation21.5

Taylor Yarborough

Computer Based CrimeComputer Based Crime

Top 10 Most CommonComputer Based Crime

1. FBI Scam2. Non-Delivery Merchandise

Payment3. Advance Fee Fraud4. Identity Theft5. Overpayment Fraud6. Miscellaneous Scam & Fraud7. Spam8. Credit Card Fraud9. Auction Fraud10. Computer Damage

CAPTCHA helps prevent spam by generating words that

computer programs can’t read.

Where Are These Spammers?

  Top Ten Countries By Count Top Ten Countries By Count United States 66.1%United States 66.1%

United Kingdom 10.5%United Kingdom 10.5%Nigeria 7.5%Nigeria 7.5%Canada 3.1%Canada 3.1%

China 1.6%China 1.6%South Africa 0.7%South Africa 0.7%

Ghana 0.6%Ghana 0.6%Spain 0.6%Spain 0.6%Italy 0.5%Italy 0.5%

Romania 0.5%Romania 0.5%

And Who Are The Targeting?

20-29

30-3940-49

50-59

60+ -20

What are the dangers?The danger for the average computer user

is that someone will hack their system. Now, most average computer users don't have anything worth stealing. But now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer to use your computer as a site to break into something further on.

Hack- to break into a computer system.

Launching Pad- to use another computer to further hacking damage.

How do we protect our computers?

Keep Your Firewall Turned On:Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers

Install or Update Your Antivirus Software:Install or Update Your Antivirus Software:  Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. 

Be Careful What You Download:Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Keep Your Operating System Up to Date:Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Protection Programs To Consider

Comodo Internet Security Norton Internet Security

Why do you think the 30-49 age group(s) are targeted

most?Answer 1: “Because they’re old and don’t

know how to work computers!” Sasja, Age 11

Answer 2: “They still think that everyone and everything should be trusted” Marie, Age 17

Answer 3: “