Transcript: cybercrime cybercrime is a crime that involves a computer and a network. cybercrime may security and financial gain. Cybercrime can come in many different forms so e of which can include hacking, identity theft or selling confidential information. Ways to stay safe from cyber crime can include: -not answering numbers you don't recognize -never give out personal information online (Your bank will never ask for sensitive information through an email) -don't click on links, if an email says you've won money and need your bank details it is not worth it they will just steal your money. A famous instance of cyber crime is in 1999, 15 year old James Jonathan hacked into and shut down NASA's computers for 21 days, around 1.7m softwear was downloaded during the attack. this cost NASA around $41,000 in repairs. hacking Hacking is when you gain unauthorized access to someone else's computer or data system. Getting hacked can be dangerous as your personal data can be leaked or used without your permission. Ways you can avoid getting hacked is not opening suspicious links, never giving out personal information ie bank information a famous example of hacking is the ILOVEYOU virus that was released 5th may 2000, the iloveyou virus is a computer worm that destroys all kinds of files including photographs, audio files and documents. Dependant on what you are sentenced for the sentence can range from community service to life imprisonment to fining. If you are convicted of hacking into computers of another country, the penalty may be more severe. Topic identity theft Identity theft is where a person uses someone elses identity ie their name, credit card information. This can cause many issues for the victim as you can commit crimes in the victims name, steal a victims money from their bank account or contact members of a victims family and asking for money. A way people can find out your personal information is by phishing this is where a person pretends to be a bank or other business in order to trick the victim into giving up personal data another way is going through peoples rubbish and finding names or bank numbers on un-shredded documents. A way to aviod identity theft is to shred important documents and to never give out sensitive information through email. Some famous examples of identity theft include Nicole McCabe who had her identity stolen in 2010 and used to assassinate Mahmound Al-Mabhoud in Dubia and she was counted as a suspect of the assassination another example is Kenneth Gibson who stole information from thousands of customers and employees personal information from 2012 to 2017 from a softwear company as an IT professional
Transcript: Aya Kambouche, Maxime Wichart & Kaylee Sleeuwits 04/12/2019 Introduction Sweetie 2.0 SWEETIE 1.0 AND 2.0 Who we are NGO Terre des Hommes Sweetie 1.0 - 2013 Sweetie 2.0 - 2016 Artificial intelligence 3D-imagery Does not show nudity Can search chatrooms and store information Your opinion Your opinion Do you think it should be possible to use the Sweetie software for detecting and investigating online grooming in the Netherlands? Legal framework Article 248e DCC He, who by means of an automated work or using a communication service, to a person who has not yet reached the age of sixteen or someone who pretends to have not yet reached the age of sixteen (whether or not with a technical tool, including a virtual creation of a person who has not yet reached the age of sixteen), proposes a meeting with the intention of committing abusive acts with a person who has not yet reached the age of sixteen or to create an image of sexual conduct involving a person who has not yet reached the age of sixteen, is punished with imprisonment of up to two years or a fine of the fourth category, if he takes any action to achieve that encounter Including someone who pretends to be under 16 (can be with a technical tool, including a virtual creation Lanzarote Convention Article 23 Computer Crime Act III Attempted grooming 'Attempt of preparation' 'Completed' offense Preparation of an attempt? Preparation acts Article 46 DCC Attempt Article 45 DCC Criminalisation of sexual communication with minors online: a different offense Prohibition of instigation 'Tallon-criterium' - Objective approach - Subjective approach ‘The public prosecution has so far made no use of the virtual child creations in detection of online sexual offenses, as practical experience has shown that incitement is inevitable in this regard.’ Possible violation of privacy rights When allowed? Privacy infringement is allowed when: Provided for by law For a legitimate purpose Necessary in democratic society Concept of subsidiarity What do you think now? ?
Transcript: By: Kyhdri Evans-Jones Criminal Justice and Cyberspace Cybercrime Cybercrime What is it? When there a crime committed using technology. Specifics Cybercrime (specific crime) An example of a cybercrime would be cyber stalking. That is when a person using thinkgs such as soical media to create what people call a burner profile to stalk a person and constantly dm or intant message them. A burner profile is a fake profile that a person creates so that they don't have to use their profile. Perp and risks Characteristics Perps are usually people you know and not strangers like most people would think. Most of the time vitvims are women. Their motivation for their actions are to seize some type of control over their victim. Victims who are victims of domestic violence are also usually victims of cyberstalking Risks can consist of a rise in anxiety and depression. The more forms of cyberstalking or stalking that a victim experieces the more risks arise and the higher the percenatage that they will experience more emotional troubles. Sleep disorder Weight change other physical symptoms Risks Risks https://us.norton.com/internetsecurity-privacy-straight-talk-about-cyberstalking.html http://www.crime-research.org/library/Cyberstalking.htm file:///Users/lejandraevans-turner/Downloads/futureinternet-11-00120-v2.pdf Works Cited Works Cited Tips Tips (Adults) Make sure that you don't give your password out to people. Change passwords fequently (do if you have a list of passwords that you won't forget). Make sure you phone and computers have a password to unlock them. Be careful posting personal information (i.e. where you are going) Always use updated security software. If you have children tell them not to provide their school, address, real name or phone number. If they are contacted by a tsranger they are to let you know immediately Also engourage them to come to you as their parent if they are being cyberstalked or harassed. Tips (children) More Tips https://us.norton.com/internetsecurity-privacy-straight-talk-about-cyberstalking.html Works Cited Works Cited Cyberstalking is a federal offense under American anti-stalking, slander, and harassment laws. Some of the pentalies that come with being convicted are a restraining order, probation, and criminal penalties including jail. The US Federal Anti-Cyber-Stalking law can be found at 47 U.S.C 223 Policing Law enforcement If you are a victim contact your local law enforcement first If your local law enforcemnt is not equipped to handle your issue the contact the FBI Internet crime complaint center. Contact info Contacts https://en.wikipedia.org/wiki/Cyberstalking https://www.fightcyberstalking.org/report-cyberstalking-case/ Work Cited Work Cited
Transcript: Identity Theft – Some hackers can gain access to sensitive information which could be used to fuel identity theft. This identity theft can cause damages to credit ratings from consumer agencies, run-ins with the law because the person who stole the identity committed a crime, or other damages which may not be repairable at all. Computer hackers in the USA go to jail for 10 years for a first offence, and a recidivist gets up to 20 years in prison. In addition, any attempt to cause damage to computers will result in serious problems. Even if there is no explicit damage, the attempt to cause damage to computer would be punished by the legislative provisions. The scale of damage is estimated by the sum of the overall damage in one year. In particular, defense or national security cases can be punished without proof. Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users. Hacking use a computer to gain unauthorized access to data in a system. Example"they hacked into a bank's computer" Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code. Originally, "hacker" did not carry the negative connotations now associated with the term. In the late 1950s and early 1960s, computers were much different than the desktop or laptop systems most people are familiar with. In those days, most companies and universities used mainframe computers: giant, slow-moving hunks of metal locked away in temperature-controlled glass cages. It cost thousands of dollars to maintain and operate those machines, and programmers had to fight for access time. Ways to protect yourself! Computer hackers have existed almost as long as computers In fact, "hackers" have been in existence for more than a century. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in New York. *THE END* Links to sites for further exploration, to report problems,etc. “It’s easy to forget that mobile devices are essentially small computers that just happen to fit in your pocket and can be used as a phone,” says Jean-Philippe Taggart, Senior Security Researcher at Malwarebytes. “Your mobile device contains a veritable treasure trove of personal information and, once unlocked, can lead to devastating consequences.” Where and when did it start? Other things that are a problem The issues with hacking! Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection. Just remember... E-mail Access – Hackers have the ability to gain access to personal e-mail accounts. These can have a variety of information and other private files which most people would regard as important. This information could also hold sensitive data which could be used against someone or simply cause ruin for those who are involved in the breach of privacy. THANKS FOR WATCHING MYSELF AND NICHOLAS FAHEYS PRESENTATION!...love u Cybercrime Presentation Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection. Present penalties & punishments
Transcript: By:Joshua Lee University poster presentation University Poster project University Poster Project Program:Biomedical Engineering University of Waterloo What you would learn learn to model and design complex biomedical systems design bionic limbs and laser-guided surgical devices apply engineering principles to create designs to improve medical treatments and procedures What is Biomedical engineering? program length:4 years 2 years co-op Students earn $17,800 on average per co-op term tuition:$47, 970 Program info Program info entry level salary for a biomedical engineer:$85,620 work at manufacturing facilities, universities, hospitals, and research facilities of companies and educational and medical institutions Salary and Workplace Salary and Workplace University of Toronto Program:Computer Science What you would learn the study of computation and applications of computing;use technology to solve problems development has been stimulated by collaborations with many areas including engineering, the physical and life sciences, mathematics and statistics and commerce. write software to make computers do new things or accomplish tasks more efficiently What is computer science? Education Required:Secondary School Credentials Awarded:Bachelor of Science Program Length:4 year(s) Co-op Option:No Part Time Study Option:Yes Tuition(in province)-$6,780 for 1 year(s) Tuition(international-$29,500 - $68,900 for 1 year(s) Residence cost-$8,300 Meal plan cost-$3,700 - $4,800 Program Info Program Info Possible Careers include Software application Developer IT help desk support Database specialist entry level salary for Software application Developer-$64,111 per year Salary and workplace info Salary and Workplace vs Comparison Comparison Pros and cons Waterloo Offers 2 years of c0-op co-op salary of $17,800 on average per co-op term tuition:$47, 970 Higher salary Pros and cons Toronto no co-op Tuition(in province)-$6,780 for 1 year(s) Tuition(international-$29,500 - $68,900 wider range of careers to choose from I would choose University of Waterloo's Biomedical engineering program because of the fact they have co-op and the subject just appeals to me more. Furthermore, a Biomedical Engineer has the highest salary out of all of the career options from both universities. Personal Choice-University of Waterloo Personal Choice
Transcript: Tyler 1st Period 10/19/21 Phishing Definition What is it? Phishing is when there are e-mails sent to people pretending to originate from banks or online retailers. Types of Phishing There are 5 main types of phishing: Spear Phishing - Targets a specific group or individual Whaling - Goes after big part of company (CEO) and says they're facing legal consequences Smishing - Attacks through text messages that involves a clickable link or return phone number Vishing - Attacks through a voice call saying there is a virus on their device and they need their personal information Email Phishing - Emails are sent to people that their account has been compromised Different Types All the Data Just the facts Phishing attacks and other cybercrimes have become more frequent over the years due to the availability and easy access to technology. So just how bad is it? How often does it happen? Frequency According to the FBI, phishing was the most common type of cyber crime in 2020—and phishing incidents nearly doubled in frequency, from 114,702 incidents in 2019, to 241,324 incidents in 2020. How much has been lost? Debt Phishing is the leading type of cybercrime and has gotten 19,369 BEC complaints cost those victims about $1.8 billion, while the 241,342 phishing complaints created losses of $54 million. How to prevent Phishing Prevention Phishing scams are a hugely profitable attack method for cybercriminals, as thousands fall victim to them every year. Fortunately phishing scams are avoidable if you know how to correctly identify them. Firewalls Firewalls Firewalls act as buffers between you, your computer and outside intruders. You should use two different kinds for your desktop and network. When used together, they drastically reduce the odds of phishers infiltrating your computer or your network. Don't touch that Pop-up Pop-ups Pop-up windows are a component that is found on almost every website. All too often, these are phishing attempts. You can use programs to block pop-ups or just click the "x" in the upper corner of the window Report It! Report It If you ever had an encounter with a phishing scam or any cyber attack, then you need to contact these government entities right away. Federal Trade Commission FTC The FTC, or Federal Trade Commission, was an identity theft program founded int 1998 to handle the skyrocketing increase of identity theft reports. They handle identity theft complaints at www.FTC.gov Internet Crime Complaint Center IC3 The IC3, or the Internet Crime Complaint Center, is a partnership between the FBI and the National White Collar Crime Center. This is another government entity that files cybercrime complaints at http://www.ic3.gov/
Transcript: Ubisoft Data Breach By: John Paul Balon, Mika Ameling For those of you who don't know, Ubisoft is a french Entertainment company.They are known for their, "world-renowned" brands. They publish several games that we know and play such as "Assasins Creed", the "Tom Clancy's" Franchise, "Just Dance", and many more. What Is Ubisoft? Ubisoft The Data Breach The Data Breach On the day of the attack (July 2, 2013) Ubisoft accounts got hacked and accessed. Ubisoft states that, "[Their] web site was exploited to gain unauthorized access to some of our online systems." They used the online systems to find the emails, usernames, and encrypted passwords and accessed online user accounts. The attackers had also decrypted all the passwords. The reason this is bad is that players' account details were compromised or in other words, accessed by the wrong people. The account details that were illegally accessed are the player's username, email, and their encrypted passwords. This made matters worse because the hackers could've tried stolen account information in other important or useful websites. Ubisoft encouraged U-Play users, which is a system for Ubisoft users, to change their account details and information. Information Leaked Why is This Bad? To prevent another data breach such as this one, some security changes should be made. Ubisoft could change their encryption code to a stronger code. They could also add Two-Factor Authentication so that people's accounts have a double security. They will get an email with a code to login. Data Breach Security Solutions & Prevention 1. https://www.bbc.com/news/technology-23159997 2.https://it.slashdot.org/story/13/07/02/1739220/ubisoft-hacked-account-data-compromised 3.https://www.firstpost.com/tech/news-analysis/ubisoft-website-hacked-hackers-get-access-to-email-addresses-and-passwords-3630625.html 4.https://www.washingtonpost.com/business/technology/ubisoft-reports-data-breach-asks-users-to-change-passwords/2013/07/02/6b79357a-e349-11e2-a11e-c2ea876a8f30_story.html 5.http://www.nbcnews.com/id/52399634/ns/technology_and_science-tech_and_gadgets/t/security-experts-blast-ubisoft-data-breach/#.XbY-OyMwgwQ Sources of Our Information Sources
Transcript: Social Media and Online Child Sex Abuse The Big Picture Social media companies should refrain from implementing end to end encryption across their services to ensure efforts to combat online child sex abuse are not hampered. Overview What is End to End Encryption? End to End Encryption Defining Online Child Sex Abuse Online Child Sex Abuse Encryption and combating abuse How are they linked? NEWSFLASH But why?... Title Title Title
Description: Structuring your syllabus doesn't have to be a huge headache with this customizable lesson plan presentation template. With a classic chalkboard theme and adaptable structure, it's easy to add new subjects, assessments, assignments, and more.
Description: For grant requests, program proposals, or any other nonprofit or education presentation, this globe-themed creative Prezi template is the way to generate interest and momentum. Like all Prezi education templates and Prezi nonprofit templates, it’s easy to customize.
Description: A well-organized training presentation template is a critical tool for education professionals. From roadmaps to reviews, this training template will help you take your next EDU training presentation to the top of the class.
Description: Impactful presentations need stunning visuals and a meaningful metaphor to show high-level concepts and the smaller details. This customizable presentation template uses a classic world map visual to help you navigate complex information while staying grounded in your presentation’s core message.
Now you can make any subject more engaging and memorable