1st Students Led conference of Surefoot International School, presented by Grade 10 students on 17th October, 2014. An ICT Integrated into Leadership and Service program the topic covered is CYBER CRIME.
2. Grade 10 students
ICT INTEGRATED INTO LEADERSHIP AND
SERVICE
17th October, 2014.
Surefoot International School
Calabar, Nigeria.
3.
4. Cybercrime is a term for any illegal activity that uses a
computer as its primary means of commission. The U.S.
Department of Justice expands the definition of
cybercrime to include any illegal activity that uses a
computer for the storage of evidence.
6. This is the process of gaining unauthorized
access into a computer system or data belonging
to someone else.
Types range from outside parties who hack into a
computer network to phishing programs which
give users a false sense of security, prompting
them to divulge sensitive information.
8. Electronic funds transfer systems have begun to
be exploited, and so has the risk that such
transactions may be intercepted and diverted.
Valid credit card numbers can be intercepted
electronically, as well as physically; the digital
information stored on a card can be
counterfeited.
10. There are many others like:
THEFT OF TELECOMMUNICATIONS SERVICES
COMMUNICATIONS IN FURTHERANCE OF
CRIMINAL CONSPIRACIES
TELECOMMUNICATIONS PIRACY
ELECTRONIC MONEY LAUNDERING AND TAX
EVASION
E.T.C
13. THE EFFECTS
The effects may vary from:
Loss Of Revenue
Wasted Time
Damaged Reputations
Reproduced Productivity
14. LOSS OF REVENUE
One of the main effects of cyber
crime on a company is a loss of
revenue. This loss can be caused by
an outside party who obtains
sensitive financial information, using
it to withdraw funds from an
organization. It can also occur when
a business's e-commerce site
15. WASTED TIME
Another major effect or
consequence of cyber crime is the
time that is wasted when an IT
personnel devotes great portions of
their day handling such incidences.
Rather than working on productive
measures for an organization, many
IT staff members spend a large
16. DAMAGED
REPUTATIONS
In cases where customer records
are compromised by a security
breach associated with cyber crime,
a company's reputation can take a
major hit. Customers whose credit
cards or other financial data
become intercepted by hackers or
other infiltrators
17. REDUCED PRODUCTIVITY
Due to the measures that many
companies must implement to
stabilize cyber crime, there is often
a negative effect on employees'
productivity. This is due to security
measures, employees must enter
more passwords and perform other
time-consuming acts in order to do
18. So far, we have seen that,
cybercrimes are done through
computer networks, which enable
hackers to get ones personal
information (hacking) and use it for
illegal activities.
Let’s have a look at how to
prevent cybercrimes.
19. PREVENTION
Secure your computer
•Activate your firewall
•Use anti-virus software
•Block spyware attacks
•Keep your system updated
Protect your E-identity
20. CALL FOR HELP
If you are a victim, if you
encounter illegal Internet content
(e.g. child exploitation) or if you
suspect a computer crime, identity
theft or a commercial scam, report
this to your local police.
21. EDUCATION
Hackers aren’t the only ones who
can gain power from information.
By educating yourself about the
types of scams that exist on the
Internet and how to avert them,
you are putting yourself one step
ahead of the cybercriminals.
22. CLICK WITH CAUTION
•When you’re on internet, be
careful not to click on any link in
messages from people you don’t
know. Even if the message is
from someone you know, be
cautious. Some viruses replicate
and spread through email, so look
for information that indicates
23. PRACTICE SAFE SHOPPING
Be cautious when
shopping at a site
that you’ve never
visited before and do
a little investigation
before you enter your
payment information.
24. BE CAREFUL ON WI-FI
Laptops and phones both
‘remember’ Wi-Fi networks which
they have ‘used’ – so hackers can
use this to break in. Avoid
conducting financial or corporate
transactions on public networks.
Also, Wi-Fi (wireless) networks at
25. USE STRONG PASSWORDS
Although it may be easier for you
to remember short passwords,
strong passwords can go a long way
in helping secure your information,
so choose a password that consists
of a combination of letters,
numbers and special characters and
26.
27. COMMANDMENTS ON
CYBERCRIME
•I will not share personal data with whomsoever it may be,
unless known.
•I will never meet someone in person with whom i come across
online.
•I will not post or download inappropriate files on the internet.
•I will not share my password with anyone.
28. COMMANDMENTS ON
CYBERCRIME
•I will not do any bank transactions on public Wi-Fi as it may
subject to banking fraud.
•I will not click on any unknown links as they may contain
harmful viruses.
29. THE
END
Presented By
Chaitali
Ebito
Tega
Emaediong
Oscar
ICT Coordinator - Mohan Robert
Homeroom Teacher - Emmanuel Isong
ICT Support - Caleb
Editor's Notes
Also look at the address bar to see if the site starts with “https://” instead of “http://” as this is another way to see if the site uses encryption.