SlideShare a Scribd company logo
1 of 29
CYBER CRIME
Grade 10 students 
ICT INTEGRATED INTO LEADERSHIP AND 
SERVICE 
17th October, 2014. 
Surefoot International School 
Calabar, Nigeria.
Cybercrime is a term for any illegal activity that uses a 
computer as its primary means of commission. The U.S. 
Department of Justice expands the definition of 
cybercrime to include any illegal activity that uses a 
computer for the storage of evidence.
Types of cyber crimes 
1. HACKING
This is the process of gaining unauthorized 
access into a computer system or data belonging 
to someone else. 
Types range from outside parties who hack into a 
computer network to phishing programs which 
give users a false sense of security, prompting 
them to divulge sensitive information.
2. ELECTRONIC FUNDS TRANSFER 
FRAUD
Electronic funds transfer systems have begun to 
be exploited, and so has the risk that such 
transactions may be intercepted and diverted. 
Valid credit card numbers can be intercepted 
electronically, as well as physically; the digital 
information stored on a card can be 
counterfeited.
DISSEMINATION OF 
OFFENSIVE 
MATERIALS
There are many others like: 
THEFT OF TELECOMMUNICATIONS SERVICES 
COMMUNICATIONS IN FURTHERANCE OF 
CRIMINAL CONSPIRACIES 
TELECOMMUNICATIONS PIRACY 
ELECTRONIC MONEY LAUNDERING AND TAX 
EVASION 
E.T.C
EFFECTS OF CYBERCRIME
THE EFFECTS 
The effects may vary from: 
Loss Of Revenue 
Wasted Time 
Damaged Reputations 
Reproduced Productivity
LOSS OF REVENUE 
One of the main effects of cyber 
crime on a company is a loss of 
revenue. This loss can be caused by 
an outside party who obtains 
sensitive financial information, using 
it to withdraw funds from an 
organization. It can also occur when 
a business's e-commerce site
WASTED TIME 
Another major effect or 
consequence of cyber crime is the 
time that is wasted when an IT 
personnel devotes great portions of 
their day handling such incidences. 
Rather than working on productive 
measures for an organization, many 
IT staff members spend a large
DAMAGED 
REPUTATIONS 
In cases where customer records 
are compromised by a security 
breach associated with cyber crime, 
a company's reputation can take a 
major hit. Customers whose credit 
cards or other financial data 
become intercepted by hackers or 
other infiltrators
REDUCED PRODUCTIVITY 
Due to the measures that many 
companies must implement to 
stabilize cyber crime, there is often 
a negative effect on employees' 
productivity. This is due to security 
measures, employees must enter 
more passwords and perform other 
time-consuming acts in order to do
So far, we have seen that, 
cybercrimes are done through 
computer networks, which enable 
hackers to get ones personal 
information (hacking) and use it for 
illegal activities. 
Let’s have a look at how to 
prevent cybercrimes.
PREVENTION 
Secure your computer 
•Activate your firewall 
•Use anti-virus software 
•Block spyware attacks 
•Keep your system updated 
 Protect your E-identity
CALL FOR HELP 
If you are a victim, if you 
encounter illegal Internet content 
(e.g. child exploitation) or if you 
suspect a computer crime, identity 
theft or a commercial scam, report 
this to your local police.
EDUCATION 
Hackers aren’t the only ones who 
can gain power from information. 
By educating yourself about the 
types of scams that exist on the 
Internet and how to avert them, 
you are putting yourself one step 
ahead of the cybercriminals.
CLICK WITH CAUTION 
•When you’re on internet, be 
careful not to click on any link in 
messages from people you don’t 
know. Even if the message is 
from someone you know, be 
cautious. Some viruses replicate 
and spread through email, so look 
for information that indicates
PRACTICE SAFE SHOPPING 
Be cautious when 
shopping at a site 
that you’ve never 
visited before and do 
a little investigation 
before you enter your 
payment information.
BE CAREFUL ON WI-FI 
Laptops and phones both 
‘remember’ Wi-Fi networks which 
they have ‘used’ – so hackers can 
use this to break in. Avoid 
conducting financial or corporate 
transactions on public networks. 
Also, Wi-Fi (wireless) networks at
USE STRONG PASSWORDS 
Although it may be easier for you 
to remember short passwords, 
strong passwords can go a long way 
in helping secure your information, 
so choose a password that consists 
of a combination of letters, 
numbers and special characters and
COMMANDMENTS ON 
CYBERCRIME 
•I will not share personal data with whomsoever it may be, 
unless known. 
•I will never meet someone in person with whom i come across 
online. 
•I will not post or download inappropriate files on the internet. 
•I will not share my password with anyone.
COMMANDMENTS ON 
CYBERCRIME 
•I will not do any bank transactions on public Wi-Fi as it may 
subject to banking fraud. 
•I will not click on any unknown links as they may contain 
harmful viruses.
THE 
END 
Presented By 
Chaitali 
Ebito 
Tega 
Emaediong 
Oscar 
ICT Coordinator - Mohan Robert 
Homeroom Teacher - Emmanuel Isong 
ICT Support - Caleb

More Related Content

What's hot

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber security
cyber security cyber security
cyber security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Viewers also liked

Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
Harsha Matta
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
Rex Galos
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (14)

Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
ICT in the Elementary School
ICT in the Elementary SchoolICT in the Elementary School
ICT in the Elementary School
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Bba L13 Dt Crime And Punishment
Bba L13 Dt   Crime And PunishmentBba L13 Dt   Crime And Punishment
Bba L13 Dt Crime And Punishment
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ICT in Elementary Education
ICT in Elementary EducationICT in Elementary Education
ICT in Elementary Education
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent50 Ways to Become More Professionally Excellent
50 Ways to Become More Professionally Excellent
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Crime

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 

Similar to Cyber Crime (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Information security
Information securityInformation security
Information security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyber Crime

  • 2. Grade 10 students ICT INTEGRATED INTO LEADERSHIP AND SERVICE 17th October, 2014. Surefoot International School Calabar, Nigeria.
  • 3.
  • 4. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. Types of cyber crimes 1. HACKING
  • 6. This is the process of gaining unauthorized access into a computer system or data belonging to someone else. Types range from outside parties who hack into a computer network to phishing programs which give users a false sense of security, prompting them to divulge sensitive information.
  • 7. 2. ELECTRONIC FUNDS TRANSFER FRAUD
  • 8. Electronic funds transfer systems have begun to be exploited, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.
  • 10. There are many others like: THEFT OF TELECOMMUNICATIONS SERVICES COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES TELECOMMUNICATIONS PIRACY ELECTRONIC MONEY LAUNDERING AND TAX EVASION E.T.C
  • 11.
  • 13. THE EFFECTS The effects may vary from: Loss Of Revenue Wasted Time Damaged Reputations Reproduced Productivity
  • 14. LOSS OF REVENUE One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site
  • 15. WASTED TIME Another major effect or consequence of cyber crime is the time that is wasted when an IT personnel devotes great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large
  • 16. DAMAGED REPUTATIONS In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators
  • 17. REDUCED PRODUCTIVITY Due to the measures that many companies must implement to stabilize cyber crime, there is often a negative effect on employees' productivity. This is due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do
  • 18. So far, we have seen that, cybercrimes are done through computer networks, which enable hackers to get ones personal information (hacking) and use it for illegal activities. Let’s have a look at how to prevent cybercrimes.
  • 19. PREVENTION Secure your computer •Activate your firewall •Use anti-virus software •Block spyware attacks •Keep your system updated  Protect your E-identity
  • 20. CALL FOR HELP If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police.
  • 21. EDUCATION Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals.
  • 22. CLICK WITH CAUTION •When you’re on internet, be careful not to click on any link in messages from people you don’t know. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates
  • 23. PRACTICE SAFE SHOPPING Be cautious when shopping at a site that you’ve never visited before and do a little investigation before you enter your payment information.
  • 24. BE CAREFUL ON WI-FI Laptops and phones both ‘remember’ Wi-Fi networks which they have ‘used’ – so hackers can use this to break in. Avoid conducting financial or corporate transactions on public networks. Also, Wi-Fi (wireless) networks at
  • 25. USE STRONG PASSWORDS Although it may be easier for you to remember short passwords, strong passwords can go a long way in helping secure your information, so choose a password that consists of a combination of letters, numbers and special characters and
  • 26.
  • 27. COMMANDMENTS ON CYBERCRIME •I will not share personal data with whomsoever it may be, unless known. •I will never meet someone in person with whom i come across online. •I will not post or download inappropriate files on the internet. •I will not share my password with anyone.
  • 28. COMMANDMENTS ON CYBERCRIME •I will not do any bank transactions on public Wi-Fi as it may subject to banking fraud. •I will not click on any unknown links as they may contain harmful viruses.
  • 29. THE END Presented By Chaitali Ebito Tega Emaediong Oscar ICT Coordinator - Mohan Robert Homeroom Teacher - Emmanuel Isong ICT Support - Caleb

Editor's Notes

  1. Also look at the address bar to see if the site starts with “https://” instead of “http://” as this is another way to see if the site uses encryption.
  2. 10 characters long