Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Crime: Zahra Shiraz 7-A

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Cyber

Crime
Zahra Shiraz 7-A
Vocabulary
 Cybercrime
 Identity
theft
 Hacking
 Malware
 Virus
 Cyber bully
 Ransom ware
What is Cyber Crime?
Cyber crime is also known as computer crime. People who commit such are
called cyber criminals.

Cyber crime is when you commit crimes online that may even be illegal.

Cybercrime either targets or uses a computer, a computer network or a networked


device.

 cybercrimeis committed by cybercriminals or hackers who want to make money.


Cybercrime is done by organizations or even individuals.

Rarely,cybercrime aims to damage computers not for profit, but also other
reasons. These could be either political or maybe personal.
Types Of Cyber Crime.

 Identity Theft:
 Identity theft is when someone steals your personal information to commit fraud under
your name. They can use your insurance information to get medical treatment, or even
give the police your name and address when they are arrested. Identity theft is
committed in many different ways.

 Hacking
 Hacking is the process of which cyber criminals steal passwords or hack into your mail
to impersonate or even blackmail you. The access to a password or other personal
information is obtained by the hacker through password cracking algorithms programs.
Dangerous Software's.
 Malware:
 Malware is a destructive software that is designed to destroy or damage computer and
computer systems. Malware is a contraction of “malicious software”

 Viruses:
 A computer virus is a malicious software program that, without the users knowledge, is
loaded onto the users computer to preform malicious actions and self- replicate itself,
creating millions of viruses that spread onto other programs and files, infecting them in
the process. However, not all viruses are destructive.

 Trojan Horse:
 A Trojan horse, also known as Trojan, is some kind of malicious code of software that
looks legitimate but is actually fake and can take over your computer completely. It is
designed to steal, damage, disrupt or in general conflict some other harmful action on
your data or network.
Dangerous Software’s.
 Ransom ware:
 Ransom ware is similar to blackmailing. It is a type of malware that prevents or limits
users from accessing their system, either by locking the systems screen or by locking the
users files until a ransom is paid.

 Spyware:
 Spyware is a malicious software that enters your computer device, gathers data about you,
and forwards it to a third-party without your consent.

 Adware:
 Adware, or advertising supported software, is software that displays unwanted and
innapropriate advertisements on your computer. Adware programs will tend to serve you
pop-up ads, can change your browser's homepage, add spyware and just bombard your
device with advertisements.
Cookies
CooKIES ARE DELICIOUS.
Cookies

 What Are Cookies?


 Cookies are files that store your data when you go online like a
username and password and is used to identify your computer as
you use a computer network. Specific cookies known as HTTP
cookies are used to identify specific users and improve your web
browsing experience. But there are also other cookies known as
tracking or third-party cookies. These track you on the internet and
give your information to third-parties. It is important to block third-
party cookies on a daily basis.
E-commerce/Online Shopping
 E-commerce, also know as online shopping is a
way of using the internet to receive goods and
services delivered to your doorstep. By allowing
the address and bank credits be taken, You can pay
online and get it delivered even the next day. Some
online shopping websites are insecure, so it’s
important to only shop and give information on
trusted sites.
Copyright and Plagiarism.
 Copyright is when the owner of the creative
material(e.g. poems, music, stories, ect.) gives the
right to other people to copy their work.

 Plagiarism is when someone copies the persons


work COMPLETELY word to word without
his/her knowledge.
How to Prevent Malware and Cyber
Crime.
 Download an antivirus software.
Downloading this can help prevent dangerous malware and viruses
entering your computer.

 Firewall:
can help protect your network by filtering traffic and blocking outsiders
from gaining unauthorized access to the private data on your computer.
Firewalls can provide different levels of protection.

 Only visit secure sites.


Only visit safe and trusted sites. You can tell is a website is secure or not
by the lock sign on the top right corner next to the URL. If its locked, it
means the site is secure.
Thank you

Zahra Shiraz 7-A

You might also like