Upload
emad-aboeleinein
View
230
Download
0
Embed Size (px)
Citation preview
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 1/12
M I S - c o u r s e p r o j e c t
F r o m : E m a d A b o E l E n i n
T o : P r o f D r I s m a i l A . T a h a
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 2/12
Agenda
What Is The Problem?
What Are The Categories Of Cyber
crime? What Can Be Done?
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 3/12
I n t e r n e t c r i m e
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 4/12
What exactly is Internet crime?
Internet crime is a recently escalating form
of crime that started with the rise of the
Internet era. Any criminal activity, which iscarried out on the Internet or by means of
the Internet, is generally termed as
Internet crime.
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 5/12
What are the various threats in the
cyberspace that I should be aware of ?
There are various ways in which criminal minds can use thepower of Internet to abuse and cheat people. Here is a list of some of the most dangerous criminal activities over the Internet:
± Hacking
± Viruses
± Pirating ± Illegal Trading
± Fraud
± Scams
± Money Laundering
± Prescription Drugs
± Defamatory Libel ± Cyber Stalking
± Cyber Terrorism
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 6/12
Where should I report an Internet
crime? The Internet Crime Complaint Center, which is a jointinitiative of the Federal Bureau of Investigation and theNational White Collar Crime Center, aims to serve as amedium to receive, develop, and refer criminal
complaints in Internet crime. The Internet CrimeComplaint Center also provides the cyber victims aneasy-to-use reporting mechanism. Other organizationsthat could be of help are Department of HomelandSecurity's National Infrastructure Coordinating Center,U.S. Computer Emergency Readiness Team, National
Association of Attorney General's Computer Crime Pointof Contact List.
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 7/12
What are the ways to protect myself from
Internet crime?
Safe and anonymous Internet browsing is the key to stayaway from cyber crime
you should avoid giving away personal details like
credit card number, social security number, home address,
telephone number, and account passwords on theInternet.
Financial transactions should be carried out over theInternet only when you are assured about the credibilityof the website.
Online shopping from suspicious websites should beavoided.
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 8/12
Who are the people that I need to watch out
for? There are plenty of people who are waiting for easy victims over the Internet.
Here is a list of all such scams scandals and other menacing elements over the Internet.
Hackers
Scammers
Phishing
Spammers
PedophilesPornography
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 9/12
What are the easiest ways to
achieve Internet Safety? Safe Internet Browsing is the first and most important rule of Internet safety.
Maintaining maximum anonymity is always the safest option while browsingthe Internet or chatting.
Do not give out your address, telephone number, credit card number, socialsecurity number, passwords or even your complete name as long as it is notcompulsory.
Do not allow strangers access to your web camera and even while chattingwith strangers via n instant messenger, try and block suspicious users.
While shopping on the Internet, make sure you select a reliable website. Avoid shopping on websites that you have never heard of, or seem fishy toyou even if they are offering attractive deals.
Do not upload your photographs, videos and your personal information onsocial networking websites, which do not have privacy settings.
Avoid using the Internet café while carrying out important transactions over the Internet.
For a safe Internet browsing experience equip your personal computer withfiltering software, anti-virus and anti-spyware software, firewall detector anda pop-up blocker which will warn you and protect you against possibleonline perils.
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 10/12
Types of Computer Crimes
Hacking
Phishing
Computer Viruses Cyber stalking
Identity Theft
8/8/2019 Emad Course Project
http://slidepdf.com/reader/full/emad-course-project 11/12
Terrorists Using the Internet As every parent knows, the Internet is full of
useful information but is also rife with
dangerous information that the general publichas no business being able to access.
Potential terrorists can learn how to make
bombs how to break into secure buildings,
how to sneak through airport security
checkpoints, or even how to murder a soldier
or dignitary, without ever leaving their home.This is a growing serious problem everywhere
around the world,
Arabic television network Al-Arabia has aired
videotapes from Al Qaeda that show
terrorists training for attacks on American andcoalition troops in Afghanistan, and those
videos have been widely circulated on the
Internet.