Computer Crimes

Preview:

DESCRIPTION

Computer Crimes. Yessenia Rico Amy Cahill Greta Leos Jacob Cordova. Computer Crime. Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. Popular Computer Crimes Identity Theft Spam Fraud - PowerPoint PPT Presentation

Citation preview

COMPUTER CRIMES

Yessenia RicoAmy CahillGreta Leos

Jacob Cordova

COMPUTER CRIME

•Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware.

Popular Computer Crimes

•Identity Theft•Spam•Fraud

• Craig's List• MySpace• Pedophiles

Identity Theft

Involves a person that is pretending to be someone else in order to steal information, money, or anything that they could want from that individual

Statistics 2007-446 data breach incidents 2008 First 9 months-516 data breach incidents 80% of these incidents are related to or

involve digital records Two-thirds of identity theft begins with

email solicitations

Spam

Spamming is the sending of unsolicitated electronic messages Most spam mail originates from advertisers

looking to push their products further Spamming contributes to other problems also

Identity theft Viruses

Myspace

Myspace is a computer crime because you can give false identity. Myspace can also generates controversy ranging from rape and murder to child predators and drug dealers.

Myspace is positive in ways as in you can chat with family, Friends who have move away.

PEDOPHILIA• As a medical diagnosis, it is defined as a psychological disorder in which an adult or older adolescent experiences a sexual preference for prepubescent children.

• The Internet Allows Pedophiles:  Instant access to other predators worldwide;

  Open discussion of their sexual desires;  Shared ideas about ways to lure victims;

  Mutual support of their adult-child sex philosophies;  Instant access to potential child victims worldwide;  Disguised identities for approaching children, even

      to the point of presenting as a member of teen groups;  Ready access to "teen chat rooms" to find out how and who

      to target as potential victims;  Means to identify and track down home contact information;

  Ability to build a long-term "Internet" relationship      with a potential victim, prior to attempting to engage

      the child in physical contact.

HOW TO AVOID COMPUTER CRIMES!!!

Passwords• Select a GOOD password, try to mix up a combination of characters in a password of only 1,2,3, or 4 characters.• Avoid obvious passwords…example (your name, date of birth, and your nickname).

Personal Information• Don’t give out banking account information unless you know it’s a secured site!!• Never give out your Social Security Number.• Make sure to logout of everything after your done using your computer, that way if someone else uses it they can’t get a hold of your personal info.

HOW TO AVOID COMPUTER CRIMES!!!

Anti-Virus Protection• Don’t bring disks in from outside

sources. • Scan demo disks and downloaded files

for viruses.

COMPUTER CRIMES HAPPEN

There is an unfortunate percent that will be victims but you can prevent it from happening by being aware of your actions on the internet.

http://en.wikipedia.org/wiki/Pedophilia

http://www.mental-health-matters.com/index.php?option=com_content&view=article&id=519http://crime.about.com/od/sex/p/pedophile.htm

http://www.csbsju.edu/uspp/CrimPsych/CPSG-6.htm

http://www.totalbankruptcy.com/

Recommended