Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Cyber Crimes

Taylor Snider
by

Taylor Snider

on 3 March 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Crimes

Taylor Snider Lily Weaver Kelly MacMillan Pd. 3 Cyber Crimes Phishing A type of fraud whereby a criminal attempts to trick their victim into accepting a false identity presented by the criminal. The common application of this approach is to send fake emails (email spoofing) to a victim purporting to come from a legitimate source and requesting information (such as a bank account number and password) or directing the victim to a fake Internet website where this information can be captured (webpage spoofing). This fraud can be very carefully targeted (where the criminal has knowledge about their victim) or indiscriminately distributed on a mass scale through SPAM. A generic term covering a range of computer network attacks whereby the attacker attempts to forge or intercede in a chain of communication. This can take a number of forms: email spoofing, IP spoofing and webpage spoofing. Phishing A type of Internet fraud whereby the “header” of an email message is falsified to appear to come from a different sender’s address. This type of criminal activity is commonly used to deliver SPAM email, or for the purposes of fraud. Email Spoofing Spoofing Unsolicited bulk email, normally sent for a commercial or fraudulent purpose. SPAM is an effective means of advertising as the costs of distribution of SPAM email is very low. Thus, even with a very low success rate, SPAMs can afford to send millions of emails to generate a few positive responses. In recent years a number of governments around the world have attempted to regulate SPAM via legislation (including Australia), however the prevalence of SPAM has not yet abated. Spam http://www.alfy.com/Most_Wanted/loadlink.aspx?url=http://computer.howstuffworks.com/phishing.htm http://www.parliament.vic.gov.au/SARC/E-Democracy/Final_Report/Glossary.htm Suppose you check your e-mail one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do? This message and others like it are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering. Most people associate phishing with e-mail messages that spoof, or mimic, banks, credit card companies or other business like Amazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam. Anitphishing.org is one of the many organizations that help protects computer users from phishing scams. http://www.commoncraft.com/phishing http://www.commoncraft.com/secure-websites-video Video Phishing scams are targeted towards people who do online banking and shopping. Also senior citizens, or anyone who is unfamilar with technology that wouldn't know how to protect themselves online. Defintions: Link: Arvind Parikh is wanted in India for illegally obtaining phone numbers that he used unlawfully. http://www.cbi.gov.in/wanted/mum49.htm Daniel MILIC is wanted for posing as a successful businessman who targets people selling property over the internet. http://www.met.police.uk/wanted/suspects/dmilic.htm http://www.theregister.co.uk/2004/10/15/phishing_charges/ http://myfloridalegal.com/pages.nsf/Main/D3C503749286AF3885256E4C0072015D?OpenDocument Phishing case How florida works against phishing In 2005, 267,000 people were phishing victims. This is roughly 5,135 people per week! Thanks for Watching!!!!!
Full transcript