Download Internet Crime PowerPoint Presentation

Login   OR  Register

Share page


Home / Computers & Web / Computers & Web Presentations / Internet Crime PowerPoint Presentation

Internet Crime PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :

Login / Signup - with account for

  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - Internet Crime By Alaina Harden & Matthew Bradshaw
  • Slide 2 - Objective To define internet crime and to identify some of the many types of internet crime To exhibit the dangers of and the ways to prevent internet crime in your home or office
  • Slide 3 - Internet Crime Internet crime can be easily defined as “any illegal act that involves a computer system where the computer is used as a tool for committing a crime.(www.mlj.com)”
  • Slide 4 - Types of Internet Crime Computer intrusion (i.e. hacking)  Password trafficking Copyright (software, movie, sound recording) piracy  Trademark counterfeiting  Counterfeiting of currency  Data transfer theft Misuse of computer time Computer output theft Desktop forgery
  • Slide 5 - Types of Internet Crime Cont. Wrongful programming Child Pornography or Exploitation Child Exploitation and Internet Fraud matters that have a mail nexus  Internet Fraud Internet harassment  Internet bomb threats  Trafficking in explosive or incendiary devices or firearms over the Internet
  • Slide 6 - Computer Intrusion (i.e. hacking) Computer intrusion “is an unauthorised access by any person using a computer and any other communications device to break computer security or circumvent it to enter into a computer system. (www.mlj.com)”
  • Slide 7 - Password Trafficking Misuse and illegal selling of other people’s passwords
  • Slide 8 - Copyright Piracy Stealing other people’s ideas, music, and anything else that could be copyrighted, and selling them or misusing them for personal gain
  • Slide 9 - Data Transfer Theft Stealing of personal information by tapping into a phone line outside one’s house and running a line directly into one’s own computer. This can often be done without one even knowing it through split lines. Some thieves will even take this a step further. When a person is done using their computer and signs off the network, they simply remain online and continue using the system as if it were actually that person. (www.avsands.com)
  • Slide 10 - Misuse of Computer Time One of the most common computer crimes, involving Public and private employees who, on the taxpayers' or company's time and money, surf the computer or play games without proper authorization. This kind of behavior in many instances is not accepted by supervisors, but there's little way to regulate it. (www.avsands.com)
  • Slide 11 - Computer Output Theft Thieves steal information that come from personal or company computers for the sake of finding out secret or personal information. They do this by taking computer printouts, mailing lists, customer lists, and etc. (www.avsands.com)
  • Slide 12 - Desktop Forgery With computer technology and desktop publishing programs, thieves copy official letterhead, documents, passports, birth certificates, and cash receipts for personal gain. (www.avsands.com)
  • Slide 13 - Wrongful Programming Wrongful programming crimes occur when someone alters a computer program and directs it to manipulate information on the network or someone's personal information. This is a more complicated crime than most others. (www.avsands.com)
  • Slide 14 - Child Pornography or Exploitation Illegally placing child pornography on the internet in order to make a profit, or looking at child pornography for pleasure.
  • Slide 15 - Internet Fraud “Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. (www.usdoj.gov)”
  • Slide 16 - Internet Harassment Stalking or harassing any person through the use of the internet.
  • Slide 17 - Ways to report Internet Crime All of the Internet Crimes that we have discussed today can be reported to your local Federal Bureau of Investigations (you can find your local office at http://www.fbi.gov/contact/fo/fo.htm).
  • Slide 18 - Real Life Instances Kenya Kidnapping Here is a real life story of a man who opened the wrong email and ended up getting kidnapped for ransom in Kenya. (http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3396768,00.html)
  • Slide 19 - Kenya Kidnapping Juergen Ahlmann is an entrepreneur in Southern California. In January 2001 he and a business partner were looking for ways to get some extra cash to launch their new catfish importing and exporting company. In an interview with "CyberCrime" Ahlmann says he was aware of "419" scams, but the origin of the messages played a big role in his decision to answer one he received.
  • Slide 20 - Kenya Kidnapping Cont. "I did not have any concerns," Ahlmann said of his first impression. "If it had been Nigeria, perhaps it would have been a different story. I never heard of anything coming out of Kenya.“ The man who contacted Ahlmann said his name was Mike Otieno and that he was from Nairobi, Kenya. Otieno claimed he was a business promoter who had a client who was willing to invest in Ahlmann's project.
  • Slide 21 - Kenya Kidnapping Cont. Juergen negotiated with the "investors" for nearly four months before they insisted that he and his associate, Jim Harrel, fly to Nairobi to sign some papers But shortly after the two businessmen arrived in Kenya, their negotiations took a turn for the worse when the "investors" found out the two did not have as much money as they thought.
  • Slide 22 - Kenya Kidnapping Cont. That's when Alhmann and Harrel became instant hostages to the men who had lured them to Kenya. "We were chained around the ankles and around the wrists," Ahlmann said. "The window [of the room they were held in] was covered with a piece of plywood so there was no daylight coming in." Their kidnappers demanded that a sum of $30,000 be paid for their release.
  • Slide 23 - Kenya Kidnapping Cont. Alhmann says he was subject to torment by the kidnappers. They threatened to hang him and his business partner upside-down and kill them if their wives could not come up with the ransom money, he says. After receiving an unusual email from her husband, Sheila Ahlmann knew something had gone wrong in Kenya and quickly contacted the FBI.
  • Slide 24 - Kenya Kidnapping Cont. FBI agents in San Diego worked with Sheila Alhmann as she agreed to send a ransom of $7,000 to a Western Union office in Nairobi. Agents from the FBI's San Diego Field Office contacted the bureau's office in Nairobi about the kidnapping. With the help of Kenyan police, authorities arrested Otieno, whose actual name is Augustine Nwanga, when he arrived at the location to pick up the ransom. These exerts were taken from the previously listed Internet address. They were written by Chris Anderson from Cyber Crime. Originally aired September 17, 2002 Modified September 16, 2002
  • Slide 25 - Real Life Internet Crime There are many stories to be told just like the previous example. Many Internet crimes are committed everyday and real people like you and me are involved in them. If you ever find yourself in the midst of one you should contact the FBI, however there are many ways to prevent these crimes altogether.
  • Slide 26 - Ways of Prevention Parents should supervise their children not to give out their real name and address to strangers, and teach them the dangers involved with using the internet. (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/) Children should be taught to report anything odd to their parents immediately (such as friendly chatters asking to keep “secret friendships”). (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/)
  • Slide 27 - Prevention Cont. Know the laws. (check some of the Internet laws at www.findlaw.com/) http://www.zdnet.com/anchordesk/story/story_2022.html Be a crime stopper. Report your findings to your local FBI bureau. http://www.zdnet.com/anchordesk/story/story_2022.html Become knowledgeable about what kind of crimes are being committed. A good place to start is http://www.cyberangels.org/. http://www.zdnet.com/anchordesk/story/story_2022.html
  • Slide 28 - Prevention Cont. You should maintain the most up to date anti-virus software, and run the software before downloading and installing software. Also maintain the most current security updates and patches for all of your operating systems and programs.
  • Slide 29 - Prevention Cont. Keep back up copies of information on removable media such as disks instead of on your hard drive. While you are not using your computer, unplug it and try not to leave both phone and electric cord in the computer at the same time.
  • Slide 30 - Prevention Cont. When shopping on the Internet be as careful as you would be in a store, don’t forget to print out a copy of your order with the company’s name and confirmation number, date and amount paid. Make up an account you use for online purposes only and deposit money into it only as you spend it.
  • Slide 31 - Prevention Cont. Do not disclose any important information such as social security numbers, etc. over the Internet, major companies do not ask for this kind of information through email. Be aware of the fact that if you do not use encryption software, any third party can read your emails. The following prevention methods were found at http://www.ccmostwanted.com/safetyguide.htm
  • Slide 32 - Thank you for your Attention We hope you have learned at least a few tips to make your Internet experience a safer one!
Bowling Free PowerPoint Template


Views : 749

Cigarettes Free PowerPoint Template


Views : 867

Photography Free PowerPoint Template


Views : 484

Female Mosquito Free PowerPoint Template

Female Mosquito

Views : 531

Drugs Medicine Free PowerPoint Template

Drugs Medicine

Views : 1098

Swans Free PowerPoint Template


Views : 473

Bird Free PowerPoint Template


Views : 345

Social Media Words Free PowerPoint Template

Social Media Words

Views : 460

Ocean Free PowerPoint Template


Views : 387

Interior Free PowerPoint Template


Views : 560

Time Management Free PowerPoint Template

Time Management

Views : 553

Good Friday Free PowerPoint Template

Good Friday

Views : 966

Woman Meditation Free PowerPoint Template

Woman Meditation

Views : 543

Traffic Lights Free PowerPoint Template

Traffic Lights

Views : 634

Saving Money Free PowerPoint Template

Saving Money

Views : 890

Diet Free PowerPoint Template


Views : 502

Nature Abstract Free PowerPoint Template

Nature Abstract

Views : 560

Cloud Computing Technology Free PowerPoint Template

Cloud Computing Technology

Views : 2997

Autumn Free PowerPoint Template


Views : 607

Law Rules Free PowerPoint Template

Law Rules

Views : 1919

Description : Available Internet Crime powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : internet crime | online crime | bullying | web crime

Shortcode : Get Shareable link