1 / 16

Computer Crimes & Internet Fraud


Download Presentation

Computer Crimes & Internet Fraud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript

  1. COMPUTER CRIMES & INTERNET FRAUD BY Ahmed NazimuddinQureshi O-I Mohsin Khalid O-I M. BilalAslam O-I Zain Ali O-I

  2. Types of computer crimes • Fraud achieved by the manipulation of computer records. • Spamming wherever outlawed completely or where regulations controlling it are violated. • Deliberate circumvention of computer security systems • Unauthorized access to or modification of programs (software cracking and hacking) and data. • Intellectual property theft, including software piracy. • Industrial espionage by means of access to or theft of computer materials. • Identity theft where this is accomplished by use of fraudulent computer transactions. • Writing or spreading computer viruses or worms.

  3. Always keep backup.Make backup copies at least every 6 months. • Before disposing of an old computer, by donation or sale: delete all data and document files. • delete all application programs (to avoid software piracy). • run WIPEINFO, in Norton Utility for DOS version 8 (or the corresponding version for the Apple Macintosh), to overwrite all of the free space on the hard disk, thus making it difficult to recover your data and document files. • Stay updated and informed ,as technology progresses, so does cyber crime.

  4. PREVENTION IS BETTER THAN CURE • Select a good password • Avoid obvious passwords • Use credible Anti-Virus Software, update regularly. • Be wary of attachments in e-mail • Use one to two Firewalls • Do not enter sensitive data on public PCs • Avoid shady sites • Prefer to access sites with https instead of http • Never give out your real name, address, city, telephone number, or other identifying information to a stranger in a chat room, computer bulletin board, or other public place.

  5. HACKING Is your system ?



  8. Hacking techniques • There are two types of techniques: • PHISHING: • PHARMING

  9. Phishing techniques

  10. Damage caused by phishing

  11. How does pharming take place

  12. Solution to Phishing and Pharming

  13. Safeguarding • Turn on your firewall. • Installing anti-spyware and antivirus software. • Login id • USB sticks


More Related