Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Crime BTA

No description
by

TIRTH SHAH

on 3 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Crime BTA

What is Cyber-crime & By: TIRTH SHAH ATIT PATEL and Remember THANK YOU FOR YOUR TIME! Personal Experiences: * What is hacking
- During the 1990s, the term "hacker" originally meant a skilled programmer proficient in machine code and computer operating systems
- Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Hacking Examples of Cyber-Crime:
- Hacking
- Identity Theft
- Cyber Stalking
- Pedophiles Definition:
crimes committed primarily
through Internet
includes computer-related
crimes, fraud, unauthorized
access with data

In simple words:
criminal activities that use
computers and network Related Stories: • Grouped name AntiSec attacked Apple

• Hacked 12 million Apple IDs

• They published 1 million Ids

• Have access to names, phone numbers and addresses

• These Information were hacked from a FBI computer

• Denmark and New Zealand were attacked

• Hacker have access to UDIDS from iPhone and iPads

• THESE ATTAKS DID NOT IMPLICATE THE FBI
the more we rely on technology, the more power hackers will have in the future
their intention will be bad and hackers will have the power (like it or not) to change the world in a negative way Why is it Important? •Only half of the population know what cybercrime is
•Hackers use the internet to gain access to personal information
•4 types of cybercrimes
•Hacking, identity theft, cyber stalking, pedophiles
•MOST SERIOUS: IDENTITY THEFT
•Hacker can get your personal information
•Names, Phone numbers, Addresses, credit card numbers etc.
•Hacker sell your personal information online for money
•Earn at least $ 2000 per credit card number
•Hacker take all the money you have
•You are left with nothing
•BE AWARE OF HACKERS Identity Theft: stealing someone's identity, pretending to be someone else
usually this is done because to access resources (Ex. Money) or obtain credit card and other benefits in that person's name
identity theft occurs when someone uses personal identifying information, Social Security Number or credit card information, without the holder's permission Cyber Stalking: Pedophilia: sexually abusing a child by an adult
the word pedophile means "child lover" , 'pedo' meaning child and 'phile' meaning love.
targeting and harming children
wanting to meet, child pornography
this crime can be done via internet What do hackers do?
steal passwords
gain access to networks without permission Advice to being safe: 1. Never ever share personal information
- including birth date, password, SIN
2. Try not to open banking information on public computers
3. Always install Anti-Virus softwares in your computer
4. Choose a strong password... and protect it!
5. Upgrade your knowledge on cyber laws! Bibliography: 1. What is cyber crime? :
-What is cyber crime?. (2010, March 07). Retrieved from http://www.cybercitizenship.org/crime/crime.html
2. Hacking:
- What is hacking?. (n.d.). Retrieved from http://whatishacking.org/
3. Identity Theft:
- Office Of The Privacy Commissioner Canada. (2008, April 15). Fact sheet: Identity theft. Retrieved from http://www.priv.gc.ca/resource/fs-fi/02_05_d_10_e.asp
4. Cyber Stalking:
-Moore, A. A. (12, 23 10). What is cyberstalking?. Retrieved from http://womensissues.about.com/od/violenceagainstwomen/f/Cyberstalking.htm
5. Pedophilia:
-What is a pedophile. (n.d.). Retrieved from http://www.child-safety-for-parents.com/what-is-a-pedophile.html
6. Related Stories:
- (n.d) Retrieved from http://www.itp.net/590316-we-have-12m-apple-ids-says-hacking-group
7. Why is it important?:
- (n.d.). Retrieved from http://moneyland.time.com/2011/12/21/hacker-is-selling-your-personal-data-online-cheap/

9. Advice to being safe:
- 2001 Jefferson Davis Highway, NATIONAL CRIME PREVENTION COUNCIL. Retrieved from www.ncpc.org Statistics : QUIZ TIME!!! 1. What is cyber crime?
2. What are the 4 types of cyber crime?
3. What are the two experiences shared from the presenters? Which one is more serious ( your opinion) ?
4. Which country has the highest number of adults who have been a victim of cyber crime? What is the percentage (%)?
5. What are some of the advices given to protect your self from cyber crime? •Is the use of internet to stalk and harass a person
•May include false accusations, monitoring, making threats etc.
•Cyber stalker may be an online stranger or a person whom the victim knows
•Is a serious offence, falls under anti-stalking laws, slander laws and harassment laws
•Stalkers Motivation: Sexual Harassment, revenge and hate, ego, and obsession for love
Full transcript