Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Cyber Crimes
Background & History
How does it happen?
-Whether it is
information, both types of information are valuable to criminals.
-A cyber criminal will attempt to steal information from bank accounts, credit cards or social security numbers and use it for
identity theft, credit card fraud or even fraudulent withdrawals from bank accounts.
Where does it happen?
Who is victimized?
65% of Web Users Are Victims of Cybercrime
Ex.: Network threats, Viruses, Internet Scams, Identity theft, etc.
Example Case A
using data from credit cards that were hacked
. These incidents occurred on December 2012 and February 2013. The total amount that was stolen from people's
What is Cybercrime?
: refers to
that involves a
, where the computers may or may not have played an instrumental part in the
commission of a crime.
Example Case B
In July of 2013, five cybercrime hackers were responsible for companies
losing over $300 million
. Five men from
had stolen over
160 credit card numbers
. They each had specific jobs when they were getting the numbers: two
went through the networks to find data
, another provided
anonymous web-hosting services
hide the group’s activities
, and another
sold the stolen data
distributed the profits
According to a recent study from a security software , manufacturing company, cybercrime has is
costing the world $110 billion a year
. According to another study the annual cost worldwide is approximately
. The majority of
because companies fear that it will give them a bad name, the company did not lose a ton of money, or the company did not even notice the loss at all.
Why should we consider cybercrimes important?
UNITED STATES CODE
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
PART I -CRIMES
CHAPTER 47-FRAUD AND FALSE STATEMENTS
Section 1030. Fraud and related activity in connection with computers.
Having knowingly accessed a computer without authorization, obtain information from a financial record or bank card, information obtained from any department or agency of the US, physical injury to any person, and threat to public health or safety.
Defense against this Crime besides laws?
Council of Europe
International Telecommunication Union
How to Protect Your Computer?
"reduce your vulnerability"
1. Keep your firewall turned on.
2. Install or Update Your Antivirus Software.
3. Install or Update Your Antispyware Technology.
4. Keep Your Operating System Up to Date.
5.Be Careful What You Download.
6.Turn Off Your Computer, properly.
In conclusion, the entire network can be used for all sorts of cyber crimes, and one should try to avoid these problems by protecting one's computer, tablet, phone, etc. from suspicious websites or downloading suspicious data/apps. As adults/parents/young adults, we should prohibit children to avoid using any social media app and we should enforce parental locks on every device the child uses to avoid cyber bullying or any internet predators. However, if anyone encounters any type of cybercrime, the best decision to make is to report it as soon as possible to the FBI, etc.
Types of Cybercrimes?
Distribution of Viruses: computer, tablet, cellphone
Stalking or Harassment
Viruses, Trojans and Worms
is a type of
several copies of itself
. It can copy itself
from using an email
similar mode of transport
, or copy itself from
one disk drive
. Worms can
compromise the security
significantly damage a computer
is a type of
code or harmful program
replicates and/or infects another partition sector
that supports macros through
to that medium. Many viruses can cause
significant damage to a computer
A Trojan Horse
is a type of
that neither copies itself or replicates itself, but
compromises the security
to a computer. In most cases, a Trojan Horse is
sent via email
, and when opened or downloaded, it
infects the computer
Where is cyber crime most common?
What are the most common types of cyber crime?
•Unpatched or outdated
•Obvious, old, or weak
that is poorly defined or not well-defined.
unnecessary software or programs
or not secured, such as FTP.
through finger, telnet, gopher, and other similar services.
installed on a network
Information Systems department.
(Household, Business, Public)
Specifically through computer networks.
The first recorded cyber crime took place in France.In the year 1820,
, a textile manufacturer, produced the
. This device allowed to repeat a series in
steps to weave special fabrics
. This resulted in fear among Jacquard's employees that they would no longer be needed and would be replaced with this device. They committed acts of sabotage to discourage Jacquard from using this new technology. This is the first recorded cyber crime!
A hacker could be
Cyber criminals follow a number of techniques in order to acquire
e-mails, Ids, credit card numbers, bank account numbers and passwords
which are then
Viruses can not only
slow your system down
, they can make it
Not only can
be infected, even
can be affected too.
Cyber criminals can access information from
Substantive cyber crime laws:
online theft, hacking, intrusion into computer systems, child pornography, intellectual property, online gambling.
Procedural cyber crime laws:
Authority to obtain
electronic data from third parties, including internet service providers; authority to intercept electronic communications.
Consequences of breaking the law:
(depending on the severity of crime)
(also depending on how severe the crime is)
Briana Limeta, Kristen Mccann, Yesenia Barraza, Stephannie Jimenez
Social Network = Virus!
The story was published on August 17, 2013: Instagram, Twitter, Youtube, LinkedIn, etc. are popular websites that cyber criminals are using to get a hold of credit card information, and identity theft.
Recent Cyber Crimes!
Zeus, a computer virus, exposed through fake social media accounts such as online marketing.
Zeus controls infected computers, Forces specific users to post fake likes, and engage in other operations or download other types of malicious software.