Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

CYBER CRIME

SANIYA AAMIR 9E

What is Cyber Crime?

Criminal activities carried out by means of computers or the Internet

Cyber crime is divided into three categories; crimes in which the


computing device is the target, crimes in which the computer is used
as a weapon, crimes in which the computer is used as an accessory
to a crime.

Cybercriminals often choose to operate in countries with weak or


nonexistent cybercrime laws.

Cybercrime may be committed by individuals or small groups, as


well as by criminal organizations

Social Networking

Social Medias are considered as


part of life for many Internet users.
Almost every internet users have
at least one social media account.
Identity theft is a threat to many
social media users, many online
users
use
their
personal
information in order to getting
registered.
Cyber Bullying and stalking are
easy to carry out; through the
given personal information

Use extra security to access


account (login Alert, security code,
trusted contacts)

Use login notification alert

Block your profile from search


engines

Log off as soon as you are done


with your work

Allow specific individuals to view


your contents

Online Banking & Online Shopping

Phishing, criminals trick people


into revealing their personal
information about their bank
accounts

Never use same PIN CODE for multiple


bank accounts

Never keep your pin code and cards


together

Cyber
Bullying
Stalking

Never leave the PC unattended when


using internet banking in a public place

Register for Mobile SMS, Email


Transaction Alerts

Never reply to emails asking for your


password or pin code

Log off and close your browser when


you are done using internet banking

When using ATM always conceal


keypad before entering pin code

Hacking

Financial Fraud

Spyware

and

Cyber

Online Games and Education

Spamming: repetitive messages

Computer Viruses

Plagiarism; using ideas, writings of


someones work without giving
proper credit

Dont reveal any personal


information

Anti-Virus Softwares

Use softwares, such as Turn-it-in to


avoid plagiarism

You might also like