Download Internet Crime PowerPoint Presentation

Login   OR  Register

Share page


Home / Computers & Web / Computers & Web Presentations / Internet Crime PowerPoint Presentation

Internet Crime PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :

Login / Signup - with account for

  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - Internet Crime By Alaina Harden & Matthew Bradshaw
  • Slide 2 - Objective To define internet crime and to identify some of the many types of internet crime To exhibit the dangers of and the ways to prevent internet crime in your home or office
  • Slide 3 - Internet Crime Internet crime can be easily defined as “any illegal act that involves a computer system where the computer is used as a tool for committing a crime.(www.mlj.com)”
  • Slide 4 - Types of Internet Crime Computer intrusion (i.e. hacking)  Password trafficking Copyright (software, movie, sound recording) piracy  Trademark counterfeiting  Counterfeiting of currency  Data transfer theft Misuse of computer time Computer output theft Desktop forgery
  • Slide 5 - Types of Internet Crime Cont. Wrongful programming Child Pornography or Exploitation Child Exploitation and Internet Fraud matters that have a mail nexus  Internet Fraud Internet harassment  Internet bomb threats  Trafficking in explosive or incendiary devices or firearms over the Internet
  • Slide 6 - Computer Intrusion (i.e. hacking) Computer intrusion “is an unauthorised access by any person using a computer and any other communications device to break computer security or circumvent it to enter into a computer system. (www.mlj.com)”
  • Slide 7 - Password Trafficking Misuse and illegal selling of other people’s passwords
  • Slide 8 - Copyright Piracy Stealing other people’s ideas, music, and anything else that could be copyrighted, and selling them or misusing them for personal gain
  • Slide 9 - Data Transfer Theft Stealing of personal information by tapping into a phone line outside one’s house and running a line directly into one’s own computer. This can often be done without one even knowing it through split lines. Some thieves will even take this a step further. When a person is done using their computer and signs off the network, they simply remain online and continue using the system as if it were actually that person. (www.avsands.com)
  • Slide 10 - Misuse of Computer Time One of the most common computer crimes, involving Public and private employees who, on the taxpayers' or company's time and money, surf the computer or play games without proper authorization. This kind of behavior in many instances is not accepted by supervisors, but there's little way to regulate it. (www.avsands.com)
  • Slide 11 - Computer Output Theft Thieves steal information that come from personal or company computers for the sake of finding out secret or personal information. They do this by taking computer printouts, mailing lists, customer lists, and etc. (www.avsands.com)
  • Slide 12 - Desktop Forgery With computer technology and desktop publishing programs, thieves copy official letterhead, documents, passports, birth certificates, and cash receipts for personal gain. (www.avsands.com)
  • Slide 13 - Wrongful Programming Wrongful programming crimes occur when someone alters a computer program and directs it to manipulate information on the network or someone's personal information. This is a more complicated crime than most others. (www.avsands.com)
  • Slide 14 - Child Pornography or Exploitation Illegally placing child pornography on the internet in order to make a profit, or looking at child pornography for pleasure.
  • Slide 15 - Internet Fraud “Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. (www.usdoj.gov)”
  • Slide 16 - Internet Harassment Stalking or harassing any person through the use of the internet.
  • Slide 17 - Ways to report Internet Crime All of the Internet Crimes that we have discussed today can be reported to your local Federal Bureau of Investigations (you can find your local office at http://www.fbi.gov/contact/fo/fo.htm).
  • Slide 18 - Real Life Instances Kenya Kidnapping Here is a real life story of a man who opened the wrong email and ended up getting kidnapped for ransom in Kenya. (http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3396768,00.html)
  • Slide 19 - Kenya Kidnapping Juergen Ahlmann is an entrepreneur in Southern California. In January 2001 he and a business partner were looking for ways to get some extra cash to launch their new catfish importing and exporting company. In an interview with "CyberCrime" Ahlmann says he was aware of "419" scams, but the origin of the messages played a big role in his decision to answer one he received.
  • Slide 20 - Kenya Kidnapping Cont. "I did not have any concerns," Ahlmann said of his first impression. "If it had been Nigeria, perhaps it would have been a different story. I never heard of anything coming out of Kenya.“ The man who contacted Ahlmann said his name was Mike Otieno and that he was from Nairobi, Kenya. Otieno claimed he was a business promoter who had a client who was willing to invest in Ahlmann's project.
  • Slide 21 - Kenya Kidnapping Cont. Juergen negotiated with the "investors" for nearly four months before they insisted that he and his associate, Jim Harrel, fly to Nairobi to sign some papers But shortly after the two businessmen arrived in Kenya, their negotiations took a turn for the worse when the "investors" found out the two did not have as much money as they thought.
  • Slide 22 - Kenya Kidnapping Cont. That's when Alhmann and Harrel became instant hostages to the men who had lured them to Kenya. "We were chained around the ankles and around the wrists," Ahlmann said. "The window [of the room they were held in] was covered with a piece of plywood so there was no daylight coming in." Their kidnappers demanded that a sum of $30,000 be paid for their release.
  • Slide 23 - Kenya Kidnapping Cont. Alhmann says he was subject to torment by the kidnappers. They threatened to hang him and his business partner upside-down and kill them if their wives could not come up with the ransom money, he says. After receiving an unusual email from her husband, Sheila Ahlmann knew something had gone wrong in Kenya and quickly contacted the FBI.
  • Slide 24 - Kenya Kidnapping Cont. FBI agents in San Diego worked with Sheila Alhmann as she agreed to send a ransom of $7,000 to a Western Union office in Nairobi. Agents from the FBI's San Diego Field Office contacted the bureau's office in Nairobi about the kidnapping. With the help of Kenyan police, authorities arrested Otieno, whose actual name is Augustine Nwanga, when he arrived at the location to pick up the ransom. These exerts were taken from the previously listed Internet address. They were written by Chris Anderson from Cyber Crime. Originally aired September 17, 2002 Modified September 16, 2002
  • Slide 25 - Real Life Internet Crime There are many stories to be told just like the previous example. Many Internet crimes are committed everyday and real people like you and me are involved in them. If you ever find yourself in the midst of one you should contact the FBI, however there are many ways to prevent these crimes altogether.
  • Slide 26 - Ways of Prevention Parents should supervise their children not to give out their real name and address to strangers, and teach them the dangers involved with using the internet. (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/) Children should be taught to report anything odd to their parents immediately (such as friendly chatters asking to keep “secret friendships”). (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/)
  • Slide 27 - Prevention Cont. Know the laws. (check some of the Internet laws at www.findlaw.com/) http://www.zdnet.com/anchordesk/story/story_2022.html Be a crime stopper. Report your findings to your local FBI bureau. http://www.zdnet.com/anchordesk/story/story_2022.html Become knowledgeable about what kind of crimes are being committed. A good place to start is http://www.cyberangels.org/. http://www.zdnet.com/anchordesk/story/story_2022.html
  • Slide 28 - Prevention Cont. You should maintain the most up to date anti-virus software, and run the software before downloading and installing software. Also maintain the most current security updates and patches for all of your operating systems and programs.
  • Slide 29 - Prevention Cont. Keep back up copies of information on removable media such as disks instead of on your hard drive. While you are not using your computer, unplug it and try not to leave both phone and electric cord in the computer at the same time.
  • Slide 30 - Prevention Cont. When shopping on the Internet be as careful as you would be in a store, don’t forget to print out a copy of your order with the company’s name and confirmation number, date and amount paid. Make up an account you use for online purposes only and deposit money into it only as you spend it.
  • Slide 31 - Prevention Cont. Do not disclose any important information such as social security numbers, etc. over the Internet, major companies do not ask for this kind of information through email. Be aware of the fact that if you do not use encryption software, any third party can read your emails. The following prevention methods were found at http://www.ccmostwanted.com/safetyguide.htm
  • Slide 32 - Thank you for your Attention We hope you have learned at least a few tips to make your Internet experience a safer one!
Dieting Free PowerPoint Template


Views : 391

Virtual Identity Free PowerPoint Template

Virtual Identity

Views : 426

DNA Free PowerPoint Template


Views : 463

Obesity Free PowerPoint Template


Views : 745

Credit Debit Card Free PowerPoint Template

Credit Debit Card

Views : 412

Easter Eggs Free PowerPoint Template

Easter Eggs

Views : 618

Question Free PowerPoint Template


Views : 510

Smoking Free PowerPoint Template


Views : 450

Statistics and Graph Free PowerPoint Template

Statistics and Graph

Views : 645

Social Media Words Free PowerPoint Template

Social Media Words

Views : 408

Email Symbol Free PowerPoint Template

Email Symbol

Views : 456

Success Achievement Free PowerPoint Template

Success Achievement

Views : 460

Whilte Tulip Free PowerPoint Template

Whilte Tulip

Views : 490

Lab Equipment Free PowerPoint Template

Lab Equipment

Views : 451

Health Tips Free PowerPoint Template

Health Tips

Views : 1025

Back to School Free PowerPoint Template

Back to School

Views : 493

Coffee Free PowerPoint Template


Views : 818

Guitar Free PowerPoint Template


Views : 884

Yoga Free PowerPoint Template


Views : 2341

Yoga Meditation Free PowerPoint Template

Yoga Meditation

Views : 741

Description : Available Internet Crime powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : internet crime | online crime | bullying | web crime

Shortcode : Get Shareable link