SlideShare una empresa de Scribd logo
1 de 11
A 
PRESENTATION ON 
“CYBER CRIMES” 
21-11-2014 Guided by: Riya Malkani Ma’am
INTRODUCTION 
• Computer crime, or Cybercrime, refers to any crime that involves 
a computer and a network. The computer may have been used in the 
commission of a crime, or it may be the target. 
• Cybercrime is nothing but: "Offences that are committed against individuals or 
groups of individuals with a criminal motive to intentionally harm the reputation of 
the victim or cause physical or mental harm to the victim directly or indirectly, 
using modern telecommunication networks such as Internet". 
• Such crimes may threaten a nation’s security and financial health. Issues 
surrounding these types of crimes have become high-profile, particularly those 
surrounding cracking, copyright infringement. There are also problems 
of privacy when confidential information is lost or intercepted, lawfully or 
otherwise.
CLASSIFICATION 
Computer crime encompasses a broad range of activities: 
• Computer viruses 
• Cyber stalking 
• Information warfare 
• Malware(malicious code) 
• Identity theft 
• Phishing scams
COMPUTER VIRUSES 
• A computer virus is 
a malware program that, when 
executed, replicates by inserting 
copies of itself (possibly modified) into 
other computer programs, data files, or 
the boot sector of the hard drive; when 
this replication succeeds, the affected 
areas are then said to be "infected“ 
• Viruses often perform some type of 
harmful activity on infected hosts, such 
as stealing hard disk space 
or CPU time, accessing private 
information, corrupting data, displaying 
political messages on the user's 
screen, spamming their contacts, 
or logging their keystrokes.
CYBER STALKING 
• Cyberstalking is often accompanied by 
real-time or offline stalking. Both are 
criminal offenses. Both are motivated by 
a desire to control, intimidate or influence 
a victim. A stalker may be an online 
stranger or a person whom the target 
knows. He may be anonymous and solicit 
involvement of other people online who 
do not even know the target. 
• Cyberstalking is a criminal offense under 
various state anti-stalking, 
slander and harassment laws. A 
conviction can result in a restraining 
order, probation, or criminal penalties 
against the assailant, including jail.
INFORMATION WARFARE 
• Information warfare may involve collection of tactical 
information, assurances that one's own information is valid, 
spreading of propaganda or disinformation to demoralize or 
manipulate the enemy and the public, undermining the quality of 
opposing force information and denial of information-collection 
opportunities to opposing forces. Information warfare is closely 
linked to psychological warfare. 
- Overview 
- Information warfare can take many forms: 
• Television and radio transmissions can be jammed. 
• Television and radio transmissions can be hijacked for 
a disinformation campaign. 
• Logistics networks can be disabled. 
• Enemy communications networks can be disabled or spoofed. 
• Stock exchange transactions can be sabotaged, either with 
electronic intervention, by leaking sensitive information or by
MALWARE(MALICIOUS CODE) 
• Malware, short for malicious software, is any software 
used to disrupt computer operation, gather sensitive 
information, or gain access to private computer systems. 
It can appear in the form of executable code, scripts, 
active content, and other software. 
• 'Malware' is a general term used to refer to a variety of 
forms of hostile or intrusive software. Malware 
includes computer viruses, worms, trojan 
horses, ransomware, spyware, adware, scareware, and 
other malicious programs. 
• Spyware or other malware is sometimes found embedded 
in programs supplied officially by companies, e.g., 
downloadable from websites, that appear useful or 
attractive, but may have, for example, additional hidden 
tracking functionality that gathers marketing statistics.
IDENTITY THEFT 
• Identity theft is a form of stealing 
someone's identity in which someone pretends 
to be someone else by assuming that person's 
identity. 
• The victim of identity theft can suffer adverse 
consequences if they are held responsible for 
the perpetrator's actions. 
• Identity theft occurs when someone uses 
another's personally identifying information, 
without their permission, to commit fraud or 
other crimes.
PHISHING SCAMS 
• Phishing is the attempt to acquire sensitive 
information such as usernames, passwords, by 
masquerading as a trustworthy entity in 
an electronic communication. 
• Phishing is typically carried out by email 
spoofing or instant messaging. 
• Phishing is a continual threat that keeps growing 
to this day. The risk grows even larger in social 
media such as Facebook, Twitter, etc.
PRECAUTIONS 
• Secure your computer: Activate your firewall, Use anti-virus/malware 
software, Block spyware attacks. 
• Install the latest operating system updates: Keep your applications and 
operating system (e.g. Windows, Mac, Linux) current with the latest system 
updates. Turn on automatic updates to prevent potential attacks on older 
software. 
• Secure your wireless network: Wi-Fi (wireless) networks at home are 
vulnerable to intrusion if they are not properly secured. Avoid conducting 
financial or corporate transactions on these networks. 
• Avoid being scammed: Always think before you click on a link or file of 
unknown origin. Don’t feel pressured by any emails. Check the source of the 
message. When in doubt, verify the source. Never reply to emails that ask 
you to verify your information or confirm your user ID or password.
Thank You 


Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber
CyberCyber
Cyber
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar a Cyber crimes

Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
CYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptxCYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptxprasmitpradhan
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 

Similar a Cyber crimes (20)

Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
cyber security
cyber security cyber security
cyber security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptxCYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Cyber crimes

  • 1. A PRESENTATION ON “CYBER CRIMES” 21-11-2014 Guided by: Riya Malkani Ma’am
  • 2. INTRODUCTION • Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. • Cybercrime is nothing but: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet". • Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 3. CLASSIFICATION Computer crime encompasses a broad range of activities: • Computer viruses • Cyber stalking • Information warfare • Malware(malicious code) • Identity theft • Phishing scams
  • 4. COMPUTER VIRUSES • A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected“ • Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 5. CYBER STALKING • Cyberstalking is often accompanied by real-time or offline stalking. Both are criminal offenses. Both are motivated by a desire to control, intimidate or influence a victim. A stalker may be an online stranger or a person whom the target knows. He may be anonymous and solicit involvement of other people online who do not even know the target. • Cyberstalking is a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.
  • 6. INFORMATION WARFARE • Information warfare may involve collection of tactical information, assurances that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare. - Overview - Information warfare can take many forms: • Television and radio transmissions can be jammed. • Television and radio transmissions can be hijacked for a disinformation campaign. • Logistics networks can be disabled. • Enemy communications networks can be disabled or spoofed. • Stock exchange transactions can be sabotaged, either with electronic intervention, by leaking sensitive information or by
  • 7. MALWARE(MALICIOUS CODE) • Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. • 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. • Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics.
  • 8. IDENTITY THEFT • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity. • The victim of identity theft can suffer adverse consequences if they are held responsible for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, without their permission, to commit fraud or other crimes.
  • 9. PHISHING SCAMS • Phishing is the attempt to acquire sensitive information such as usernames, passwords, by masquerading as a trustworthy entity in an electronic communication. • Phishing is typically carried out by email spoofing or instant messaging. • Phishing is a continual threat that keeps growing to this day. The risk grows even larger in social media such as Facebook, Twitter, etc.
  • 10. PRECAUTIONS • Secure your computer: Activate your firewall, Use anti-virus/malware software, Block spyware attacks. • Install the latest operating system updates: Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. • Secure your wireless network: Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Avoid conducting financial or corporate transactions on these networks. • Avoid being scammed: Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.