Cybercrime powerpoint

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

By: ted88daniels (38 month(s) ago)

Kindly send me a copy of this for our seminar on Cyber crime awareness... Thanks po. teddaniels92@yahoo.com

By: ted88daniels (38 month(s) ago)

Kindly send me a copy of this for our seminar on Cyber crime awareness... Thanks po.

By: 18792 (45 month(s) ago)

itz nyc.. cud i th copy of this at good.smriti@gmail.com ?

By: sheetalb (61 month(s) ago)

kindly send acopy@sheetalb1979@gmail.com

By: naveencse (69 month(s) ago)

Can i get the copy of your presentation on my email address is naveen_
cse527@yahoo.co.in

Presentation Transcript

Slide 1: 

Cyber Crime Awareness EFREN LAGAC FERNANDEZ II, GCTCP Police Chief Inspector Chief, Administrative Branch Chief, MIS/Forensic Sec, Investigation Branch Anti-Transnational Crime Division Criminal Investigation and Detection Group

Why learn about CYBER CRIME ? : 

Why learn about CYBER CRIME ? Because – - Everybody is using COMPUTERS. - From white collar criminals to terrorist organizations And from Teenagers to Adults. - Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers - New generation is growing up with computers. - MOST IMPORTANT – Monetary transactions are moving on to the INTERNET.

WHAT IS COMPUTER CRIME? : 

WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. IN SHORT COMPUTER CRIME is any crime where – Computer is a target. Computer is a tool of crime Computer is incidental to crime

Profile of Cyber Criminal : 

Profile of Cyber Criminal Disgruntled employees. Teenagers. Political Hacktivist. Professional Hackers. Business Rival. Ex-Boy Friend. Divorced Husband. etc

Slide 5: 

Victims Gullible Desperados and greedy people Unskilled & Inexperienced Unlucky people

Slide 6: 

Computer Crimes are Vulnerable Because of : - Anonymity, Computer’s storage capacity, Weakness in Operation System, Lack of Awareness of user.

Introduction to the Internet : 

Introduction to the Internet The Internet places a vast amount of information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite stock. However, as the legitimate use of the Internet increases throughout our nation and the world, the wrongful use of the Internet to commit crime and victimize people also increases.

Child Pornography : 

Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in all places. Its explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.

Child Pornography : 

Child Pornography The easy access to the pornographic contents readily and freely available over the internet lower the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence.

Child Pornography : 

Child Pornography Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet.

Child Exploitation : 

Child Exploitation Children can be sexually exploited, kidnapped, molested and solicited by individuals using online service. One reason is the anonymous nature of the Internet. Another reason is the large number of people using the Internet. Pedophiles will make contact with victims by having children call collect so the pedophile's telephone number will not show up on their parent's telephone bill.

Child Exploitation : 

Child Exploitation Pedophiles will also purchase a prepaid telephone card and give children a toll free access number enabling children to call from anywhere they choose. Pedophiles will often convince children to send them a photograph. Pedophiles will offer children money for their photograph and/or pose as professional photographers to obtain nude, graphic or sexually explicit photographs of children.

Child Exploitation : 

Child Exploitation Pedophiles commonly attempt to lower the inhibitions of children through deception in an attempt to lead children into their sexual conversations or acts. There are a number of ways parents can protect their children from becoming victims of pedophiles on the Internet.

Ways of Preventing Child Exploitation in the Internet : 

Ways of Preventing Child Exploitation in the Internet The following are some examples: Choose an online service that offers parental control features; Purchase blocking software and design your own safety system; Monitor children that are online and monitor the time they spend online; Ensure children never reveal identifying information about themselves on the Internet in a public chat room, on an electronicbulletin board or in their E-mail messages;

Ways of Preventing Child Exploitation in the Internet : 

Ways of Preventing Child Exploitation in the Internet Ensure children do not give out personal information about themselves such as their age; Consider using a pseudonym or unlisting your child' s name; Get to know the services your child uses; Block out objectionable material through your Internet service provider; Never allow a child to arrange a face-to-face meeting with another computer user without parental permission;

Ways of Preventing Child Exploitation in the Internet : 

Ways of Preventing Child Exploitation in the Internet Ensure children never respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening Encourage children to tell you whenever they encounter such messages; If you or your children receives a message that is harassing, sexual in nature, or threatening, forward a copy of the message to your service provider and ask for their assistance

Ways of Preventing Child Exploitation in the Internet : 

Ways of Preventing Child Exploitation in the Internet If you become aware of the transmission, use, or viewing of child pornography while online, report it to the National Center for Missing and Exploited Children; Teach children that people online may not be who they seem; Teach children online service providers never ask for passwords and they should never give their password out; Teach children that everything they read or see on the Internet may not be true;

Ways of Preventing Child Exploitation in the Internet : 

Ways of Preventing Child Exploitation in the Internet Teach children to never let anyone pressure them into doing something they feel uncomfortable doing; Teach children to never enter an area on the Internet that charges for services without asking permission from a responsible adult first; Some children have access to the Internet at school. Check with the school authorities to ensure your children are properly supervised and monitored by a responsible adult; Know your children' s friends and their parents.