SlideShare una empresa de Scribd logo
1 de 46
A Computer Ethics
        Seminar
          Presented by:
       Jennifer June Jaen


University of the Philippines
     Open University
           Computer Ethics
Internet
 Crime
  and
 Safety
                       Sept. 9, 2012
                         Cebu City
     Computer Ethics
Objectives of the Seminar
• To be able to identify vulnerabilities in the use of the
Internet such as in social networking sites, e-
commerce, and e-mail
• To be able to identify, detect, and protect from certain
types of cyber-attacks such as cyber-bullying, unethical
hacking, and identity theft

• To identify the role of privacy and freedom of
expression in the proliferation of Internet crime such as
pornography

                         Computer Ethics
It is a crime committed using a computer or
the Internet by an individual or organization.

                   Computer Ethics
Perpetrators of Cybercrime
• Hackers
 Test limit of system and gain publicity

• Crackers
 Steal data, corrupt systems, create problems




                    Computer Ethics
Perpetrators of Cybercrime
• Insider
  Corrupt systems, make money
• Industrial spy
  Capture trade secrets, for competition




                   Computer Ethics
Perpetrators of Cybercrime
• Cybercriminal
 Make money

• Cyber-terrorist
 Destroy key infrastructure



                Computer Ethics
Virus
These are malicious software that are
created by cybercriminals who use the
internet to perpetrate their crimes




                Computer Ethics
Spam
Spam is the abuse of electronic
messaging systems to indiscriminately
send unsolicited bulk messages




                 Computer Ethics
Scam




Computer Ethics
Scam examples




    Computer Ethics
Phishing

 It is an attempt to acquire information
such as usernames, passwords, credit
card details by masquerading as a
legitimate business.




                  Computer Ethics
Phishing
The senders are phishing for your
personal information so they can
use it to commit fraud.




               Computer Ethics
Phising Example




     Computer Ethics
Phising Example




     Computer Ethics
Detect and Avoid Phishing

Be wary of links and pop-ups from e-
mails and browsers.




               Computer Ethics
Detect and Avoid Phishing




          Computer Ethics
Identity Theft
Identity theft occurs when someone uses your
personally identifying information, like your
name, Social Security number, or credit card
number, without your knowledge, to commit fraud or
other crimes.




                      Computer Ethics
How Identity Thieves Steal
• Phishing
Pretend to be legitimate companies and send spam or
pop-up messages to trick you to revealing your
personal information.
• Skimming
Use special storage device to steal credit/debit card
information during processing




                         Computer Ethics
How Identity Thieves Steal
• Dumpster Diving
Rummage through trash looking for bills or documents
with your personal data on it

• Old-Fashioned Stealing
Steal wallets and purses, mail, bank
and credit card statements, or
personnel records



                        Computer Ethics
What Thieves Do with
                Stolen Identity
• May open new bank accounts in your name
• May open new credit card accounts in your name
• May open new phone account and other accounts in
your name
• May use your name to obtain utility services like
electricity, cable, etc.
•May obtain loan in your name
•May do purchases like house, clothes and avail of trips
and other luxuries in your name

                           Computer Ethics
Is Your Identity stolen?
• You are charged for debts you didn’t incur

• You receive mails about houses or
apartments you didn’t buy or jobs you
never had
• Be denied of loans due to bad credit
history caused by others



                     Computer Ethics
Combat Identity Theft

Deter
     Detect
                    Defend

        Computer Ethics
Passwords
• Create strong passwords and change
them often
• Never give your password or
account numbers to anyone




               Computer Ethics
Browsing
• Enter the URL when doing sensitive
transactions
• Access secure websites. Look for
https:// or a lock.




                Computer Ethics
Software

• Do not download software or
images from unknown sources




              Computer Ethics
Software

• Install firewall and anti-virus and
anti-spyware software.




               Computer Ethics
Social Networking


 An online service, platform, or site that helps
build social networks or social relations among
 people with shared interests, background, or
              real life connections.




                     Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking Sites
    15 Most Visited




        Computer Ethics
Social Networking
                 Dangers
Exposure to predators and cybercrimes
• Scam/Phishing
• Theft
• Stalking
• Invasion of privacy
• Child Exploitation
• Pornography
                   Computer Ethics
Online Dating
Many people use dating sites, social
networking sites, and chat rooms to meet
people. And some forge successful
relationships.




                  Computer Ethics
Online Dating
                     Dangers
But predators also use these sites to meet
potential victims.
• They create fake profiles to build online
relationships.
• Eventually convince people to send them
money or do other favors in the name of
love.
• Or worse, do other crimes like rape and
other forms of abuse.

                        Computer Ethics
Online Dating
             Dangers


An online love interest who asks
for money is almost certainly a
scam artist.




               Computer Ethics
Parental Control Tips
                                      Check
Limit your kid's                     websites
  time online.
                                Avoid
                               sex talk
   No to cyber-
    bullying
                   Who are in your kid’s
                      contact list?
                   Computer Ethics
Computer Ethics
Cyber-bullying

Posting hurtful and harmful messages
or material to others on the Internet




               Computer Ethics
Cyber-bullying may occur in
• E-mail
• Instant messaging
• Chat rooms
• Social networking sites
• Forums
• Blogs

                Computer Ethics
Examples of Cyber-bullying




          Computer Ethics
How to Protect Yourself from
        Online Predators
• Do not give too much information about
                 yourself




                 Computer Ethics
How to Protect Yourself from
           Online Predators
• Set the right privacy settings



          Get secured!

                      Computer Ethics
How to Protect Yourself from
     Online Predators




           Computer Ethics
How to Protect Yourself from
          Online Predators
• Increase your awareness of cybercrime


Knowledge
  is Key!


                   Computer Ethics
Thank you for coming! 



         Computer Ethics
References
                     Ethics in Information Technology, G. Reynolds
  http://www.bizymoms.com/computers-and-technology/uses-of-the-internet.html
                    http://en.wikipedia.org/wiki/Spam_(electronic)
                       http://en.wikipedia.org/wiki/Email_spam
                         http://en.wikipedia.org/wiki/Phishing
         http://www.scamwatch.gov.au/content/index.phtml/tag/onlinescams
                                 http://onguardonline.gov
     http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
                             http://www.identitytheft.org/
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
                 http://www.familysafecomputers.org/predators.htm
            http://www.ebizmba.com/articles/social-networking-websites
       http://www.slideshare.net/burtlo/introduction-to-cybersafety-5690788
              http://www.slideshare.net/karlmp/internet-safety-2956537
  http://www.slideshare.net/grp4.ed451/cyber-predator-presentation-presentation
                 http://www.slideshare.net/caskeyd/students-i-safety
 http://www.msnbc.msn.com/id/6083442/ns/dateline_nbc/t/dangers-children-face-
                                 online/#.UEWpW8EgfSg

                                   Computer Ethics

Más contenido relacionado

La actualidad más candente (20)

Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying [autosaved]
Bullying [autosaved]Bullying [autosaved]
Bullying [autosaved]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-Integrity
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying -
Cyberbullying - Cyberbullying -
Cyberbullying -
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Destacado

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Mark Peralta
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Sonnie Santos
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringLemi Orhan Ergin
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software DevelopmentLemi Orhan Ergin
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

Destacado (16)

Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software Development
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similar a IS201 Internet Crime and Safety

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 

Similar a IS201 Internet Crime and Safety (20)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 

Último

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Último (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

IS201 Internet Crime and Safety

  • 1. A Computer Ethics Seminar Presented by: Jennifer June Jaen University of the Philippines Open University Computer Ethics
  • 2. Internet Crime and Safety Sept. 9, 2012 Cebu City Computer Ethics
  • 3. Objectives of the Seminar • To be able to identify vulnerabilities in the use of the Internet such as in social networking sites, e- commerce, and e-mail • To be able to identify, detect, and protect from certain types of cyber-attacks such as cyber-bullying, unethical hacking, and identity theft • To identify the role of privacy and freedom of expression in the proliferation of Internet crime such as pornography Computer Ethics
  • 4. It is a crime committed using a computer or the Internet by an individual or organization. Computer Ethics
  • 5. Perpetrators of Cybercrime • Hackers Test limit of system and gain publicity • Crackers Steal data, corrupt systems, create problems Computer Ethics
  • 6. Perpetrators of Cybercrime • Insider Corrupt systems, make money • Industrial spy Capture trade secrets, for competition Computer Ethics
  • 7. Perpetrators of Cybercrime • Cybercriminal Make money • Cyber-terrorist Destroy key infrastructure Computer Ethics
  • 8. Virus These are malicious software that are created by cybercriminals who use the internet to perpetrate their crimes Computer Ethics
  • 9. Spam Spam is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages Computer Ethics
  • 11. Scam examples Computer Ethics
  • 12. Phishing It is an attempt to acquire information such as usernames, passwords, credit card details by masquerading as a legitimate business. Computer Ethics
  • 13. Phishing The senders are phishing for your personal information so they can use it to commit fraud. Computer Ethics
  • 14. Phising Example Computer Ethics
  • 15. Phising Example Computer Ethics
  • 16. Detect and Avoid Phishing Be wary of links and pop-ups from e- mails and browsers. Computer Ethics
  • 17. Detect and Avoid Phishing Computer Ethics
  • 18. Identity Theft Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your knowledge, to commit fraud or other crimes. Computer Ethics
  • 19. How Identity Thieves Steal • Phishing Pretend to be legitimate companies and send spam or pop-up messages to trick you to revealing your personal information. • Skimming Use special storage device to steal credit/debit card information during processing Computer Ethics
  • 20. How Identity Thieves Steal • Dumpster Diving Rummage through trash looking for bills or documents with your personal data on it • Old-Fashioned Stealing Steal wallets and purses, mail, bank and credit card statements, or personnel records Computer Ethics
  • 21. What Thieves Do with Stolen Identity • May open new bank accounts in your name • May open new credit card accounts in your name • May open new phone account and other accounts in your name • May use your name to obtain utility services like electricity, cable, etc. •May obtain loan in your name •May do purchases like house, clothes and avail of trips and other luxuries in your name Computer Ethics
  • 22. Is Your Identity stolen? • You are charged for debts you didn’t incur • You receive mails about houses or apartments you didn’t buy or jobs you never had • Be denied of loans due to bad credit history caused by others Computer Ethics
  • 23. Combat Identity Theft Deter Detect Defend Computer Ethics
  • 24. Passwords • Create strong passwords and change them often • Never give your password or account numbers to anyone Computer Ethics
  • 25. Browsing • Enter the URL when doing sensitive transactions • Access secure websites. Look for https:// or a lock. Computer Ethics
  • 26. Software • Do not download software or images from unknown sources Computer Ethics
  • 27. Software • Install firewall and anti-virus and anti-spyware software. Computer Ethics
  • 28. Social Networking An online service, platform, or site that helps build social networks or social relations among people with shared interests, background, or real life connections. Computer Ethics
  • 29. Social Networking Sites 15 Most Visited Computer Ethics
  • 30. Social Networking Sites 15 Most Visited Computer Ethics
  • 31. Social Networking Sites 15 Most Visited Computer Ethics
  • 32. Social Networking Dangers Exposure to predators and cybercrimes • Scam/Phishing • Theft • Stalking • Invasion of privacy • Child Exploitation • Pornography Computer Ethics
  • 33. Online Dating Many people use dating sites, social networking sites, and chat rooms to meet people. And some forge successful relationships. Computer Ethics
  • 34. Online Dating Dangers But predators also use these sites to meet potential victims. • They create fake profiles to build online relationships. • Eventually convince people to send them money or do other favors in the name of love. • Or worse, do other crimes like rape and other forms of abuse. Computer Ethics
  • 35. Online Dating Dangers An online love interest who asks for money is almost certainly a scam artist. Computer Ethics
  • 36. Parental Control Tips Check Limit your kid's websites time online. Avoid sex talk No to cyber- bullying Who are in your kid’s contact list? Computer Ethics
  • 38. Cyber-bullying Posting hurtful and harmful messages or material to others on the Internet Computer Ethics
  • 39. Cyber-bullying may occur in • E-mail • Instant messaging • Chat rooms • Social networking sites • Forums • Blogs Computer Ethics
  • 40. Examples of Cyber-bullying Computer Ethics
  • 41. How to Protect Yourself from Online Predators • Do not give too much information about yourself Computer Ethics
  • 42. How to Protect Yourself from Online Predators • Set the right privacy settings Get secured! Computer Ethics
  • 43. How to Protect Yourself from Online Predators Computer Ethics
  • 44. How to Protect Yourself from Online Predators • Increase your awareness of cybercrime Knowledge is Key! Computer Ethics
  • 45. Thank you for coming!  Computer Ethics
  • 46. References Ethics in Information Technology, G. Reynolds http://www.bizymoms.com/computers-and-technology/uses-of-the-internet.html http://en.wikipedia.org/wiki/Spam_(electronic) http://en.wikipedia.org/wiki/Email_spam http://en.wikipedia.org/wiki/Phishing http://www.scamwatch.gov.au/content/index.phtml/tag/onlinescams http://onguardonline.gov http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx http://www.identitytheft.org/ http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html http://www.familysafecomputers.org/predators.htm http://www.ebizmba.com/articles/social-networking-websites http://www.slideshare.net/burtlo/introduction-to-cybersafety-5690788 http://www.slideshare.net/karlmp/internet-safety-2956537 http://www.slideshare.net/grp4.ed451/cyber-predator-presentation-presentation http://www.slideshare.net/caskeyd/students-i-safety http://www.msnbc.msn.com/id/6083442/ns/dateline_nbc/t/dangers-children-face- online/#.UEWpW8EgfSg Computer Ethics