Download Internet Crime PowerPoint Presentation


Login   OR  Register

Iframe embed code :

Presentation url :


Description :

Available Internet Crime powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags :

internet crime | online crime | bullying | web crime

Home / Computers & Web / Computers & Web Presentations / Internet Crime PowerPoint Presentation

Internet Crime PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Internet Crime powerpoint presentation easily and in no time. This helps you give your presentation on Internet Crime in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Internet Crime powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by worldwideweb in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Slide 1 - Internet Crime By Alaina Harden & Matthew Bradshaw
Slide 2 - Objective To define internet crime and to identify some of the many types of internet crime To exhibit the dangers of and the ways to prevent internet crime in your home or office
Slide 3 - Internet Crime Internet crime can be easily defined as “any illegal act that involves a computer system where the computer is used as a tool for committing a crime.(www.mlj.com)”
Slide 4 - Types of Internet Crime Computer intrusion (i.e. hacking)  Password trafficking Copyright (software, movie, sound recording) piracy  Trademark counterfeiting  Counterfeiting of currency  Data transfer theft Misuse of computer time Computer output theft Desktop forgery
Slide 5 - Types of Internet Crime Cont. Wrongful programming Child Pornography or Exploitation Child Exploitation and Internet Fraud matters that have a mail nexus  Internet Fraud Internet harassment  Internet bomb threats  Trafficking in explosive or incendiary devices or firearms over the Internet
Slide 6 - Computer Intrusion (i.e. hacking) Computer intrusion “is an unauthorised access by any person using a computer and any other communications device to break computer security or circumvent it to enter into a computer system. (www.mlj.com)”
Slide 7 - Password Trafficking Misuse and illegal selling of other people’s passwords
Slide 8 - Copyright Piracy Stealing other people’s ideas, music, and anything else that could be copyrighted, and selling them or misusing them for personal gain
Slide 9 - Data Transfer Theft Stealing of personal information by tapping into a phone line outside one’s house and running a line directly into one’s own computer. This can often be done without one even knowing it through split lines. Some thieves will even take this a step further. When a person is done using their computer and signs off the network, they simply remain online and continue using the system as if it were actually that person. (www.avsands.com)
Slide 10 - Misuse of Computer Time One of the most common computer crimes, involving Public and private employees who, on the taxpayers' or company's time and money, surf the computer or play games without proper authorization. This kind of behavior in many instances is not accepted by supervisors, but there's little way to regulate it. (www.avsands.com)
Slide 11 - Computer Output Theft Thieves steal information that come from personal or company computers for the sake of finding out secret or personal information. They do this by taking computer printouts, mailing lists, customer lists, and etc. (www.avsands.com)
Slide 12 - Desktop Forgery With computer technology and desktop publishing programs, thieves copy official letterhead, documents, passports, birth certificates, and cash receipts for personal gain. (www.avsands.com)
Slide 13 - Wrongful Programming Wrongful programming crimes occur when someone alters a computer program and directs it to manipulate information on the network or someone's personal information. This is a more complicated crime than most others. (www.avsands.com)
Slide 14 - Child Pornography or Exploitation Illegally placing child pornography on the internet in order to make a profit, or looking at child pornography for pleasure.
Slide 15 - Internet Fraud “Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. (www.usdoj.gov)”
Slide 16 - Internet Harassment Stalking or harassing any person through the use of the internet.
Slide 17 - Ways to report Internet Crime All of the Internet Crimes that we have discussed today can be reported to your local Federal Bureau of Investigations (you can find your local office at http://www.fbi.gov/contact/fo/fo.htm).
Slide 18 - Real Life Instances Kenya Kidnapping Here is a real life story of a man who opened the wrong email and ended up getting kidnapped for ransom in Kenya. (http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3396768,00.html)
Slide 19 - Kenya Kidnapping Juergen Ahlmann is an entrepreneur in Southern California. In January 2001 he and a business partner were looking for ways to get some extra cash to launch their new catfish importing and exporting company. In an interview with "CyberCrime" Ahlmann says he was aware of "419" scams, but the origin of the messages played a big role in his decision to answer one he received.
Slide 20 - Kenya Kidnapping Cont. "I did not have any concerns," Ahlmann said of his first impression. "If it had been Nigeria, perhaps it would have been a different story. I never heard of anything coming out of Kenya.“ The man who contacted Ahlmann said his name was Mike Otieno and that he was from Nairobi, Kenya. Otieno claimed he was a business promoter who had a client who was willing to invest in Ahlmann's project.
Slide 21 - Kenya Kidnapping Cont. Juergen negotiated with the "investors" for nearly four months before they insisted that he and his associate, Jim Harrel, fly to Nairobi to sign some papers But shortly after the two businessmen arrived in Kenya, their negotiations took a turn for the worse when the "investors" found out the two did not have as much money as they thought.
Slide 22 - Kenya Kidnapping Cont. That's when Alhmann and Harrel became instant hostages to the men who had lured them to Kenya. "We were chained around the ankles and around the wrists," Ahlmann said. "The window [of the room they were held in] was covered with a piece of plywood so there was no daylight coming in." Their kidnappers demanded that a sum of $30,000 be paid for their release.
Slide 23 - Kenya Kidnapping Cont. Alhmann says he was subject to torment by the kidnappers. They threatened to hang him and his business partner upside-down and kill them if their wives could not come up with the ransom money, he says. After receiving an unusual email from her husband, Sheila Ahlmann knew something had gone wrong in Kenya and quickly contacted the FBI.
Slide 24 - Kenya Kidnapping Cont. FBI agents in San Diego worked with Sheila Alhmann as she agreed to send a ransom of $7,000 to a Western Union office in Nairobi. Agents from the FBI's San Diego Field Office contacted the bureau's office in Nairobi about the kidnapping. With the help of Kenyan police, authorities arrested Otieno, whose actual name is Augustine Nwanga, when he arrived at the location to pick up the ransom. These exerts were taken from the previously listed Internet address. They were written by Chris Anderson from Cyber Crime. Originally aired September 17, 2002 Modified September 16, 2002
Slide 25 - Real Life Internet Crime There are many stories to be told just like the previous example. Many Internet crimes are committed everyday and real people like you and me are involved in them. If you ever find yourself in the midst of one you should contact the FBI, however there are many ways to prevent these crimes altogether.
Slide 26 - Ways of Prevention Parents should supervise their children not to give out their real name and address to strangers, and teach them the dangers involved with using the internet. (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/) Children should be taught to report anything odd to their parents immediately (such as friendly chatters asking to keep “secret friendships”). (http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/)
Slide 27 - Prevention Cont. Know the laws. (check some of the Internet laws at www.findlaw.com/) http://www.zdnet.com/anchordesk/story/story_2022.html Be a crime stopper. Report your findings to your local FBI bureau. http://www.zdnet.com/anchordesk/story/story_2022.html Become knowledgeable about what kind of crimes are being committed. A good place to start is http://www.cyberangels.org/. http://www.zdnet.com/anchordesk/story/story_2022.html
Slide 28 - Prevention Cont. You should maintain the most up to date anti-virus software, and run the software before downloading and installing software. Also maintain the most current security updates and patches for all of your operating systems and programs.
Slide 29 - Prevention Cont. Keep back up copies of information on removable media such as disks instead of on your hard drive. While you are not using your computer, unplug it and try not to leave both phone and electric cord in the computer at the same time.
Slide 30 - Prevention Cont. When shopping on the Internet be as careful as you would be in a store, don’t forget to print out a copy of your order with the company’s name and confirmation number, date and amount paid. Make up an account you use for online purposes only and deposit money into it only as you spend it.
Slide 31 - Prevention Cont. Do not disclose any important information such as social security numbers, etc. over the Internet, major companies do not ask for this kind of information through email. Be aware of the fact that if you do not use encryption software, any third party can read your emails. The following prevention methods were found at http://www.ccmostwanted.com/safetyguide.htm
Slide 32 - Thank you for your Attention We hope you have learned at least a few tips to make your Internet experience a safer one!