SlideShare ist ein Scribd-Unternehmen logo
1 von 29
CYBER CRIME: AN OVERVIEW
The Internet = A World of Opportunities Look what’s at your fingertips  ,[object Object]
Access to information and entertainment
A means to learn, meet people, and explore,[object Object]
Primary Online Risks and Threats To Families ,[object Object]
File-sharing abuses
Invasion of privacy
Disturbing content
PredatorsTo Personal Information ,[object Object]
Hoaxes
Identity theft
SpamTo Computers ,[object Object]
Worms
Trojans
Spyware,[object Object]
Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
Steps You Can Take Your computer Turn on the OS Internet firewall. Keep Windows or other OS up-to-date. Install and maintain antivirus software. Yourself Practice Internet behavior that lowers your risk. Manage your personal information carefully. Use anti-phishing and anti-spam technology built into the OS. Your family Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private.
Four Steps to Help ProtectYour Computer Turn on Windows or other OS Internet firewall Keep Windows or other OS   up-to-date Install and maintain antivirus software Install and maintain antispyware software
Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
Use Automatic Updates to Keep Software Up-to-date ,[object Object]
Automatic updates provide the best protectionwww.microsoft.com/protect
Install and Maintain Antivirus Software ,[object Object]
For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click
Back up Your Files ,[object Object]
Use a Web-based backup service,[object Object]
Only download files from Web sites you trust,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentationshelbyfutures
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 

Was ist angesagt? (20)

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Protect
ProtectProtect
Protect
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Andere mochten auch

Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Sito Yelas
 
Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Sito Yelas
 
Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Clara Álvarez
 
Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Clara Álvarez
 
Paula tiene dos mamás
Paula tiene dos mamásPaula tiene dos mamás
Paula tiene dos mamásSafire
 
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasCLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasSito Yelas
 
O Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoO Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoIBMemorialJC
 
Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Clara Álvarez
 
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Aurélien Fiévez
 
Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Manuel Rodriguez
 
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Romain Fonnier
 
Palestra Igreja Esperança
Palestra Igreja EsperançaPalestra Igreja Esperança
Palestra Igreja Esperançalcsmbr
 
Geografía del mundo griego
Geografía del mundo griegoGeografía del mundo griego
Geografía del mundo griegofrancimanz
 
Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?IBMemorialJC
 

Andere mochten auch (20)

Resultados TN Infantil 2011
Resultados TN Infantil 2011Resultados TN Infantil 2011
Resultados TN Infantil 2011
 
Veni vidi twitti
Veni vidi twitti Veni vidi twitti
Veni vidi twitti
 
Repaso tema 6 y 7
Repaso tema 6 y 7Repaso tema 6 y 7
Repaso tema 6 y 7
 
Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12Clasicos de bolsillo: Luciano y 12
Clasicos de bolsillo: Luciano y 12
 
Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5Clasicos de bolsillo: Isocrates 5
Clasicos de bolsillo: Isocrates 5
 
El juicio de Orestes
El juicio de OrestesEl juicio de Orestes
El juicio de Orestes
 
cap1.2
cap1.2cap1.2
cap1.2
 
Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3Jenofonte, Ciropedia, I, 3, 2-3
Jenofonte, Ciropedia, I, 3, 2-3
 
Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1Escolios a Esquilo, Agamenón, 1
Escolios a Esquilo, Agamenón, 1
 
Paula tiene dos mamás
Paula tiene dos mamásPaula tiene dos mamás
Paula tiene dos mamás
 
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias CuriosasCLASICOS DE BOLSILLO: Eliano Historias Curiosas
CLASICOS DE BOLSILLO: Eliano Historias Curiosas
 
O Grande Doador nos Deu Trabalho
O Grande Doador nos Deu TrabalhoO Grande Doador nos Deu Trabalho
O Grande Doador nos Deu Trabalho
 
GRIEGO I (9)
GRIEGO I (9)GRIEGO I (9)
GRIEGO I (9)
 
Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4Lisias, Contra Eratóstenes, 4
Lisias, Contra Eratóstenes, 4
 
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
Modèle synthèse visant l’intégration de la tablette tactile en salle de class...
 
Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)Introducción a la lengua latina (Paula Freiría)
Introducción a la lengua latina (Paula Freiría)
 
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
Baromètre sur les adblocks sur le marché Français - IAB - Novembre 2016
 
Palestra Igreja Esperança
Palestra Igreja EsperançaPalestra Igreja Esperança
Palestra Igreja Esperança
 
Geografía del mundo griego
Geografía del mundo griegoGeografía del mundo griego
Geografía del mundo griego
 
Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?Como vai sua família? Vai tudo bem?
Como vai sua família? Vai tudo bem?
 

Ähnlich wie CYBERCRIME: AN OVERVIEW

02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 

Ähnlich wie CYBERCRIME: AN OVERVIEW (20)

Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
IT Security
IT SecurityIT Security
IT Security
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

CYBERCRIME: AN OVERVIEW

  • 1. CYBER CRIME: AN OVERVIEW
  • 2.
  • 3. Access to information and entertainment
  • 4.
  • 5.
  • 9.
  • 12.
  • 13. Worms
  • 15.
  • 16. Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 17. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
  • 18. Steps You Can Take Your computer Turn on the OS Internet firewall. Keep Windows or other OS up-to-date. Install and maintain antivirus software. Yourself Practice Internet behavior that lowers your risk. Manage your personal information carefully. Use anti-phishing and anti-spam technology built into the OS. Your family Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private.
  • 19. Four Steps to Help ProtectYour Computer Turn on Windows or other OS Internet firewall Keep Windows or other OS up-to-date Install and maintain antivirus software Install and maintain antispyware software
  • 20. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
  • 21.
  • 22. Automatic updates provide the best protectionwww.microsoft.com/protect
  • 23.
  • 24. For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
  • 25. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
  • 26. Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 36. Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are onlineHelpful online resources www.staysafe.org www.getnetwise.org
  • 37.
  • 38. Get to know how your kids use the Internet
  • 39. Let your kids be the teacher
  • 40. Teach kids to trust their instincts
  • 41.
  • 42. Monitor your children’s online activities
  • 43. Teach your children to report suspicious activity
  • 44.
  • 45. Do not click links in e-mail
  • 46. Treat others the way you want to be treated
  • 47. Stand up for yourself
  • 48. Respect other people’s property
  • 49.
  • 50.
  • 51. Be on the lookout for online scams
  • 52.
  • 53. Use only secure and trusted Web sites
  • 54. Make sure you are where you think you are: Web sites can be faked
  • 55. Avoid financial transactions over wireless networks
  • 56.
  • 57.
  • 58. Follow up in writing
  • 60. Place fraud alert on credit reportsGet a copy of your credit reportand ensure your account is marked “fraud alert” and “victim’s statement”
  • 61. For More Information WILLIAM WARERO MANAGER RIVOTEK KENYA LTD bwarero@rivotek.co.ke www.rivotek.co.ke

Hinweis der Redaktion

  1. Use Anti-Phishing and Anti-Spam TechnologyInternet service providers, e-mail programs, and Web browsers get better all the time. They block billions of spam e-mails daily. For example, spam filters in Microsoft Outlook, Windows Live Hotmail, and Windows Live Messenger provide strong defenses against unwanted junk e-mail, instant messages, and images.Microsoft Outlook helps reduce the amount of spam in your Inbox by filtering junk mail into a special folder. You can review the mail in this folder to make sure no legitimate mail got filtered by accident, and you can add these legitimate senders to your approved sender list to make sure they don’t get filtered again. You should delete the rest of the mail in your junk mail folder without opening it.Internet Explorer 7 includes Phishing Filter technology, which blocks access to known fraudulent sites and warns you about potentially suspicious sites. You can also use Phishing Filter to report sites that you are suspicious about, so that these sites can be reviewed.OPTIONAL For example, Microsoft is using technical innovations to help prevent spam and phishing scams from ever reaching peoples’ inboxes. Safer e-mail: Microsoft is building e-mail technology that can be used in other products and services, which stops criminals from spoofing legitimate Web sites and hiding their identities. Currently, this technology helps to protect more than 200 million Windows Live Hotmail customers worldwide against online scams.Filtered e-mail: Microsoft uses technology to identify and remove vast quantities of spam before it is ever delivered. SmartScreen filtering technology blocks more than 3.2 billion spam e-mail messages per day worldwide in Hotmail alone. In addition, Microsoft provides monthly updates to the Outlook junk mail filters, to help customers better protect and manage their inboxes from spam and other e-mail-perpetrated scams.