Enviar búsqueda
Cargar
Josh Moulin: Cyberstalking Presentation
•
Descargar como PPTX, PDF
•
2 recomendaciones
•
2,295 vistas
Josh Moulin, MSISA,CISSP
Seguir
In this presentation Josh Moulin provides information on Cyberstalking.
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 33
Descargar ahora
Recomendados
File000165
File000165
Desmond Devendran
File000159
File000159
Desmond Devendran
File000161
File000161
Desmond Devendran
File000158
File000158
Desmond Devendran
Perspectivesmanage
Perspectivesmanage
Art Bowker
File000155
File000155
Desmond Devendran
Cyberstalking
Cyberstalking
Dawid Kryniewski
Cyberstalking
Cyberstalking
Trevschic
Recomendados
File000165
File000165
Desmond Devendran
File000159
File000159
Desmond Devendran
File000161
File000161
Desmond Devendran
File000158
File000158
Desmond Devendran
Perspectivesmanage
Perspectivesmanage
Art Bowker
File000155
File000155
Desmond Devendran
Cyberstalking
Cyberstalking
Dawid Kryniewski
Cyberstalking
Cyberstalking
Trevschic
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
cyber stalking
cyber stalking
Rishabh Kataria
Wiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
Julie
Internet Safety
Internet Safety
columbiahighschoollibrary
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
MarketingatBahrain
Cyberbullying
Cyberbullying
sapphirechallenge
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
jackson_carrie
Cyber defamtion
Cyber defamtion
Yogesh Pandit
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461
Bonnie Black
Online Defamation
Online Defamation
Andrew Wellman
Social Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
Top 5 Computer Crime's
Top 5 Computer Crime's
Mar Soriano
Stalking 101 power point
Stalking 101 power point
Hi-Line's Help
Cyber defamation
Cyber defamation
Tuhin Batra
Misrepresentation and fraud
Misrepresentation and fraud
nishna sathyan
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
Law of defamation
Law of defamation
Jimi Kayode
Defamation
Defamation
Credit Management Association
Stalking
Stalking
citinfo
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin, MSISA,CISSP
privtechsomeassemb
privtechsomeassemb
Jonathan Alley
Más contenido relacionado
Destacado
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
cyber stalking
cyber stalking
Rishabh Kataria
Wiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
Julie
Internet Safety
Internet Safety
columbiahighschoollibrary
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
MarketingatBahrain
Cyberbullying
Cyberbullying
sapphirechallenge
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
jackson_carrie
Cyber defamtion
Cyber defamtion
Yogesh Pandit
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461
Bonnie Black
Online Defamation
Online Defamation
Andrew Wellman
Social Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
Top 5 Computer Crime's
Top 5 Computer Crime's
Mar Soriano
Stalking 101 power point
Stalking 101 power point
Hi-Line's Help
Cyber defamation
Cyber defamation
Tuhin Batra
Misrepresentation and fraud
Misrepresentation and fraud
nishna sathyan
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
Law of defamation
Law of defamation
Jimi Kayode
Defamation
Defamation
Credit Management Association
Stalking
Stalking
citinfo
Destacado
(20)
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
cyber stalking
cyber stalking
Wiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
Internet Safety
Internet Safety
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
Cyberbullying
Cyberbullying
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
Cyber defamtion
Cyber defamtion
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461
Online Defamation
Online Defamation
Social Networking and Internet Safety
Social Networking and Internet Safety
Top 5 Computer Crime's
Top 5 Computer Crime's
Stalking 101 power point
Stalking 101 power point
Cyber defamation
Cyber defamation
Misrepresentation and fraud
Misrepresentation and fraud
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Law of defamation
Law of defamation
Defamation
Defamation
Stalking
Stalking
Similar a Josh Moulin: Cyberstalking Presentation
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin, MSISA,CISSP
privtechsomeassemb
privtechsomeassemb
Jonathan Alley
Technology & The Law
Technology & The Law
34734
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
National Crime Prevention Council
Social Media in the Philippines.pptx
Social Media in the Philippines.pptx
ChristianneVentura
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
Cyber Security as a Service
Cyber Security as a Service
US-Ignite
Cyber bullying
Cyber bullying
pa21raym
TSCM Overview for Stakeholders
TSCM Overview for Stakeholders
kevinwetzel
Projektfuzet angol-web
Projektfuzet angol-web
Ombodi Gábor
A Tale of One City
A Tale of One City
Felicia Nelson
The Hidden Exposures of Technology
The Hidden Exposures of Technology
smithad612
Cyber Forensics.ppt
Cyber Forensics.ppt
HODCSEKncet
E safety-course_2010
E safety-course_2010
kevinbrace
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
Similar a Josh Moulin: Cyberstalking Presentation
(17)
Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft Prevention
privtechsomeassemb
privtechsomeassemb
Technology & The Law
Technology & The Law
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
Social Media in the Philippines.pptx
Social Media in the Philippines.pptx
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Cyber Security as a Service
Cyber Security as a Service
Cyber bullying
Cyber bullying
TSCM Overview for Stakeholders
TSCM Overview for Stakeholders
Projektfuzet angol-web
Projektfuzet angol-web
A Tale of One City
A Tale of One City
The Hidden Exposures of Technology
The Hidden Exposures of Technology
Cyber Forensics.ppt
Cyber Forensics.ppt
E safety-course_2010
E safety-course_2010
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks Slideshare
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Más de Josh Moulin, MSISA,CISSP
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Josh Moulin, MSISA,CISSP
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
Josh Moulin, MSISA,CISSP
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin, MSISA,CISSP
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin, MSISA,CISSP
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin, MSISA,CISSP
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin, MSISA,CISSP
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin, MSISA,CISSP
Más de Josh Moulin, MSISA,CISSP
(7)
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law Enforcement
Último
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Scott Andery
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
ThousandEyes
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
Último
(20)
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
2024 April Patch Tuesday
2024 April Patch Tuesday
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Josh Moulin: Cyberstalking Presentation
1.
Joshua S. Moulin JoshMoulin.com
2.
Instructor Background Former
Police Lieutenant / FBI Cyber Crime Task Force Commander Former Forensic Lab Director of Accredited Laboratory Internationally certified in Cyber Security, Digital Forensics, and Incident Response Currently a contractor working in National Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
3.
Oregon Ranks 3rd
Highest in the Nation Registered Sex Offenders Per Capita © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
4.
Crimes Committed with
Technology © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4 Identity Theft Domestic Violence Homicide/Suicide Internet Fraud/Forgery E-mail Threats Bomb Threats Stalking & Harassment Missing Persons Child Exploitation & Abuse Gambling Prostitution Extortion Narcotics Software Piracy Intrusions/Hacking/Trade Secrets
5.
Cyberstalking Each year,
3.4 million Americans are the victims of stalking 65% of these stalking cases are initiated online! © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
6.
Stalking Statistics 3
in 4 victims are stalked by someone they know 30% of victims are stalked by a current or former partner 10% are stalked by a stranger 11% of victims have been stalked for 5 or more years 46% of victims experience at least one unwanted contact per week 10% of victims report being monitored with GPS, 8% with video/cameras/listening devices © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
7.
Cyberstalking v. Offline
Stalking - Similarities The majority of cyber stalking suspects had an intimate relationship with the victim Most victims are women and most suspects are men Suspects are generally motivated by their desire to control the victim © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
8.
Cyberstalking v. Offline
Stalking - Differences Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
9.
Cyberstalking © Josh Moulin
- GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
10.
Oregon Statistics © Josh
Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10 2010 Domestic Violence Counts
11.
Technologies that Facilitate
Stalking Caller ID & Voice changer Record calls Buy calling cards with cash Difficult to locate evidence © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
12.
Call Spoofing © Josh
Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
13.
Mobile Phone Stalking ©
Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
14.
Mobile Phone Stalking ©
Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
15.
Mobile Phone Stalking ©
Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
16.
Mobile Phone Stalking ©
Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
17.
Technologies that Facilitate
Stalking Allows users to record messages using AOL Instant Messenger (AIM) Is anonymous © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
18.
Technologies that Facilitate
Stalking Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers Viruses and other malware are prevalent Some malware will infect a computer and allow suspects to track movements of the victim online © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
19.
Technologies that Facilitate
Stalking Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer Several software applications are designed to record user activity and send reports to a third party © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
20.
Technologies that Facilitate
Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
21.
Technologies that Facilitate
Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
22.
Technologies that Facilitate
Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
23.
Technologies that Facilitate
Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
24.
GPS Tracking © Josh
Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
25.
Social Networking in
Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
26.
Social Networking in Cyberstalking ©
Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
27.
Social Networking in
Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
28.
Technology Tracking © Josh
Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
29.
Geotagging © Josh Moulin
- GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
30.
Tips to avoid
becoming a victim of Cyberstalking Don’t respond to flaming (provocation online) Choose a genderless screen name Don’t flirt online – unless you are prepared for the consequences Save offending messages and report them to your service provider © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
31.
Tips to avoid
becoming a victim of Cyberstalking If a threat is made in a chat room or message board notify the moderator immediately Don’t confront the stalker/harasser Get out of a situation online that has become hostile Google yourself occasionally to see what information is being posted about yourself (personal information) Don’t accept files or open attachments from other users © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
32.
Tips to avoid
becoming a victim of Cyberstalking Use strong passwords on all devices and don’t allow others to use your electronic devices Be aware of social networking websites “checking you in” to locations and geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
33.
Contact Information Joshua S.
Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS Cyber Security and Digital Forensics http://JoshMoulin.com Email: Josh@JoshMoulin.com © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33
Descargar ahora