SlideShare a Scribd company logo
6
Most read
INTERNET FRAUD :-
- Karmaveer Singh Sankhla
- 201127107188
What is internet ?
• Internet is a global computer network providing a variety of information and communication
facilities, consisting of interconnected networks using standardized communication protocols.
• The Internet is a global network that comprises many voluntarily interconnected autonomous
networks. It operates without a central governing body. The technical underpinning and
standardization of the core protocols (IPv4 and IPv6) is an activity of the internet engineering
task force (IETF), a non-profit organization of loosely affiliated international participants that
anyone may associate with by contributing technical expertise.
Advantages of internet
:-
• Information, knowledge, and learning.
• Connectivity, communication, and
sharing.
• Address, mapping, and contact
information.
• Banking, bills, and shopping.
• Selling and making money.
• Collaboration, work from home, and
access to a global workforce.
• Donations and funding.
• Entertainment. Etc………
Disadvantages of
internet :-
• Addiction, time-waster, and causes
distractions.
• Bullying, trolls, stalkers, and crime.
• Spam and advertising.
• Pornographic and violent images.
• Never being able to disconnect from
work.
• Internet fraud.
• Identity theft, hacking, viruses, and
cheating.
Internet fraud :-
• A crime in which the perpetrator develops a scheme using one or more elements of the
internet to deprive a person of property or any interest, estate, or right by a false
representation of a matter of fact, whether by providing misleading information or by
concealment of information.
• Internet fraud is the use of Internet services or software with Internet access to defraud
victims or to otherwise take advantage of them.
Tools which are used
in internet fraud -
• Phishing
• Fake profiles
• Fake photos
• Fake entities
• Fake claims
• Fake names, credentials and
badge numbers
• Computer pop-ups
Types of internet
frauds -
• email scam
• Online shopping frauds
• Identity theft
• Work from home scam
• Lottery fraud
• Matrimonial frauds
• Tax scams
• Credit card reward point fraud
• Frauds on OLX
• Social media frauds Etc…………..
HOW TO BE SAFE FROM INTERNET
FRAUD -
• Keep your computers and mobile devices up to date. Having the latest security software, web browser, and
operating system are the best defenses against viruses, malware, and other online threats. Turn on automatic
updates so you receive the newest fixes as they become available.
• Set strong passwords. A strong password is at least eight characters in length and includes a mix of upper and
lowercase letters, numbers, and special characters.
• Watch out for phishing scams. Phishing scams use fraudulent emails and websites to trick users into disclosing
private account or login information. Do not click on links or open any attachments or pop-up screens from
sources you are not familiar with. Forward phishing emails to the Federal Trade Commission (FTC) at
spam@uce.gov – and to the company, bank, or organization impersonated in the email.
• Keep personal information personal. Hackers can use social media profiles to figure out your passwords
and answer those security questions in the password reset tools. Lock down your privacy settings and
avoid posting things like birthdays, addresses, mother’s maiden name, etc. Be wary of requests to connect
from people you do not know.
• Secure your internet connection. Always protect your home wireless network with a password. When
connecting to public Wi-Fi networks, be cautious about what information you are sending over it.
• Shop safely. Before shopping online, make sure the website uses secure technology. When you are at the
checkout screen, verify that the web address begins with https. Also, check to see if a tiny locked padlock
symbol appears on the page.
• Read the site’s privacy policies. Though long and complex, privacy policies tell you how
the site protects the personal information it collects. If you don’t see or understand a site’s
privacy policy, consider doing business elsewhere.
THANK YOU !!!!!

More Related Content

PPTX
Module 1- Introduction to Cybercrime.pptx
PPTX
Credit card frauds
PPT
Anti Money Laundering Presentation
DOCX
Credit card fraud detection
PDF
Fraud Risk Assessment- detection and prevention- Part- 2,
PDF
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
PPTX
an atm with an eye
PPTX
Ecash and ewallet
Module 1- Introduction to Cybercrime.pptx
Credit card frauds
Anti Money Laundering Presentation
Credit card fraud detection
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
an atm with an eye
Ecash and ewallet

What's hot (20)

PPT
Social Engineering | #ARMSec2015
PPTX
Fraud principles1
PPTX
Cyber crime types & laws
PPT
Fraud Awareness For Managers
PPTX
Atm frauds
PDF
Current Trends in Fraud Prevention
PPTX
Securityawareness
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPT
Identity theft
PDF
Human Factors in Cyber Security: User authentication as a use case
PPTX
Fraud risk management training - Elsam Management Consultants
PPT
Credit card fraud
PDF
Fraud Risk Assessment
PPTX
Reconnaissance and Social Engineering
PPT
Introduction to Cyber Law
PPTX
What is Phishing and How can you Avoid it?
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Cyber bulling
PPTX
Identity theft ppt
PDF
Fraud & Risk Management - A Guide to Good Practice
Social Engineering | #ARMSec2015
Fraud principles1
Cyber crime types & laws
Fraud Awareness For Managers
Atm frauds
Current Trends in Fraud Prevention
Securityawareness
Phishing Scams: 8 Helpful Tips to Keep You Safe
Identity theft
Human Factors in Cyber Security: User authentication as a use case
Fraud risk management training - Elsam Management Consultants
Credit card fraud
Fraud Risk Assessment
Reconnaissance and Social Engineering
Introduction to Cyber Law
What is Phishing and How can you Avoid it?
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Cyber bulling
Identity theft ppt
Fraud & Risk Management - A Guide to Good Practice
Ad

Similar to Computer and internet fraud (20)

PPTX
Internet issues
PPT
Fraud Presentation
PPTX
Internet use issues
PDF
Identity Theft: Evolving with Technology
DOC
Cyber Fraud
PPT
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
PPT
Computer crime by inqilab patel
PDF
Cyber Law & Forensics
PDF
Cyber modified
PPTX
Internet fraud #scichallenge2017
 
PPTX
Security-and-Privacy-Issues.power-pointp
PPTX
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
PPTX
Cyber safety.pptx
PPTX
Cyber Security
PPTX
INTERNET SAFETY-WPS Office (1).pptx
PPTX
Cyber Crime & Precautions
PDF
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
PDF
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
PPT
Cyber crime and cyber security
PPTX
Internet secutity ppt by vaishnavi khandelwal
Internet issues
Fraud Presentation
Internet use issues
Identity Theft: Evolving with Technology
Cyber Fraud
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Computer crime by inqilab patel
Cyber Law & Forensics
Cyber modified
Internet fraud #scichallenge2017
 
Security-and-Privacy-Issues.power-pointp
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
Cyber safety.pptx
Cyber Security
INTERNET SAFETY-WPS Office (1).pptx
Cyber Crime & Precautions
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
Cyber crime and cyber security
Internet secutity ppt by vaishnavi khandelwal
Ad

Recently uploaded (20)

PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
tcp ip networks nd ip layering assotred slides
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPT
Ethics in Information System - Management Information System
DOCX
Unit-3 cyber security network security of internet system
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPTX
Introduction to Information and Communication Technology
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
tcp ip networks nd ip layering assotred slides
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about ICD -10 and ICD-11 PPT.pptx
Ethics in Information System - Management Information System
Unit-3 cyber security network security of internet system
The New Creative Director: How AI Tools for Social Media Content Creation Are...
presentation_pfe-universite-molay-seltan.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Sims 4 Historia para lo sims 4 para jugar
Tenda Login Guide: Access Your Router in 5 Easy Steps
Decoding a Decade: 10 Years of Applied CTI Discipline
Exploring VPS Hosting Trends for SMBs in 2025
Introduction to Information and Communication Technology
E -tech empowerment technologies PowerPoint
Job_Card_System_Styled_lorem_ipsum_.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt

Computer and internet fraud

  • 1. INTERNET FRAUD :- - Karmaveer Singh Sankhla - 201127107188
  • 2. What is internet ? • Internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. • The Internet is a global network that comprises many voluntarily interconnected autonomous networks. It operates without a central governing body. The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the internet engineering task force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
  • 3. Advantages of internet :- • Information, knowledge, and learning. • Connectivity, communication, and sharing. • Address, mapping, and contact information. • Banking, bills, and shopping. • Selling and making money. • Collaboration, work from home, and access to a global workforce. • Donations and funding. • Entertainment. Etc………
  • 4. Disadvantages of internet :- • Addiction, time-waster, and causes distractions. • Bullying, trolls, stalkers, and crime. • Spam and advertising. • Pornographic and violent images. • Never being able to disconnect from work. • Internet fraud. • Identity theft, hacking, viruses, and cheating.
  • 5. Internet fraud :- • A crime in which the perpetrator develops a scheme using one or more elements of the internet to deprive a person of property or any interest, estate, or right by a false representation of a matter of fact, whether by providing misleading information or by concealment of information. • Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.
  • 6. Tools which are used in internet fraud - • Phishing • Fake profiles • Fake photos • Fake entities • Fake claims • Fake names, credentials and badge numbers • Computer pop-ups
  • 7. Types of internet frauds - • email scam • Online shopping frauds • Identity theft • Work from home scam • Lottery fraud • Matrimonial frauds • Tax scams • Credit card reward point fraud • Frauds on OLX • Social media frauds Etc…………..
  • 8. HOW TO BE SAFE FROM INTERNET FRAUD - • Keep your computers and mobile devices up to date. Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Turn on automatic updates so you receive the newest fixes as they become available. • Set strong passwords. A strong password is at least eight characters in length and includes a mix of upper and lowercase letters, numbers, and special characters. • Watch out for phishing scams. Phishing scams use fraudulent emails and websites to trick users into disclosing private account or login information. Do not click on links or open any attachments or pop-up screens from sources you are not familiar with. Forward phishing emails to the Federal Trade Commission (FTC) at spam@uce.gov – and to the company, bank, or organization impersonated in the email.
  • 9. • Keep personal information personal. Hackers can use social media profiles to figure out your passwords and answer those security questions in the password reset tools. Lock down your privacy settings and avoid posting things like birthdays, addresses, mother’s maiden name, etc. Be wary of requests to connect from people you do not know. • Secure your internet connection. Always protect your home wireless network with a password. When connecting to public Wi-Fi networks, be cautious about what information you are sending over it. • Shop safely. Before shopping online, make sure the website uses secure technology. When you are at the checkout screen, verify that the web address begins with https. Also, check to see if a tiny locked padlock symbol appears on the page.
  • 10. • Read the site’s privacy policies. Though long and complex, privacy policies tell you how the site protects the personal information it collects. If you don’t see or understand a site’s privacy policy, consider doing business elsewhere.