SlideShare a Scribd company logo
Discovering God's Creation Science 10-12: Forensics: Crime Scene Investigation 21.5 Taylor Yarborough Computer Based Crime
Top 10 Most Common Computer Based Crime FBI Scam Non-Delivery Merchandise Payment Advance Fee Fraud Identity Theft Overpayment Fraud Miscellaneous Scam & Fraud Spam Credit Card Fraud Auction Fraud Computer Damage CAPTCHA  helps prevent spam by generating words that  computer programs can’t read.
 
Where Are These Spammers?   Top Ten Countries By Count  United States 66.1% United Kingdom 10.5% Nigeria 7.5% Canada 3.1% China 1.6% South Africa 0.7% Ghana 0.6% Spain 0.6% Italy 0.5% Romania 0.5%
And Who Are The Targeting? 20-29 30-39 40-49 50-59 60+ -20
What are the dangers? The danger for the average computer user is that someone will hack their system. Now, most average computer users don't have anything worth stealing. But now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer to use your computer as a site to break into something further on. Hack- to break into a computer system. Launching Pad- to use another computer to further hacking damage.
How do we protect our computers? Keep Your Firewall Turned On:  A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers Install or Update Your Antivirus Software:   Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge.  Be Careful What You Download:  Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code. Keep Your Operating System Up to Date:  Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Protection Programs To Consider Comodo Internet Security  Norton Internet Security
Why do you think the 30-49 age group(s) are targeted most? Answer 1: “Because they’re old and don’t know how to work computers!” Sasja, Age 11 Answer 2: “They still think that everyone and everything should be trusted”  Marie, Age 17 Answer 3: “

More Related Content

PDF
Computer Security
PPTX
Adware
PPTX
RANSOMWARE
PDF
7 Signs that Tell your Computer has been Hacked
PPT
Safety Plano Library June 4 Main
PPT
Viruses Spyware and Spam, Oh My!
Computer Security
Adware
RANSOMWARE
7 Signs that Tell your Computer has been Hacked
Safety Plano Library June 4 Main
Viruses Spyware and Spam, Oh My!

What's hot (18)

PPTX
Spyware
PPTX
spyware
PPT
Computer Malware
PPTX
Spyware and key loggers
PPT
Jeopardy
PPT
Slideshow Alisha Schnapper
PPTX
Internet PC Security by Khalil Jubran Mindspring Networks
PDF
WISE KIDS Leaflet: eSecurity
PPTX
Malware
PPTX
spyware
PDF
What Is Spyware?
PPT
spyware
PPT
Malware
PDF
Computer viruses and its prevention
PPTX
Spyware presentation by mangesh wadibhasme
PPTX
Virus Spyware Quiz
 
PPTX
PPT
Spyware and adware
Spyware
spyware
Computer Malware
Spyware and key loggers
Jeopardy
Slideshow Alisha Schnapper
Internet PC Security by Khalil Jubran Mindspring Networks
WISE KIDS Leaflet: eSecurity
Malware
spyware
What Is Spyware?
spyware
Malware
Computer viruses and its prevention
Spyware presentation by mangesh wadibhasme
Virus Spyware Quiz
 
Spyware and adware
Ad

Viewers also liked (17)

PPTX
카톡은 수다다
DOCX
Виробництво біогазу на птахофабриках
PPTX
Servicio de Moderación Sourtech
PPTX
1주차 기사 자료발표
PPTX
How animals get their food 10-11
PPS
正北極極點90度(music)
PPT
Leksion 3 -_nisja_e_biznesi_te_ri
PPTX
Presentación1
PDF
Competencia en sector comunicaciones
PPT
My summer 7
PDF
My MCBS Story
PDF
Real decreto 121 2010 boib derechos y deveres de los alumnos
PPS
Musas do carnaval rj 2013
PDF
Catálogo marco estilo Enmarco2.0
PDF
Daemon Web Portals And Applications
DOC
Trabajo practico nº 5
PPT
Susurros nocturnos
카톡은 수다다
Виробництво біогазу на птахофабриках
Servicio de Moderación Sourtech
1주차 기사 자료발표
How animals get their food 10-11
正北極極點90度(music)
Leksion 3 -_nisja_e_biznesi_te_ri
Presentación1
Competencia en sector comunicaciones
My summer 7
My MCBS Story
Real decreto 121 2010 boib derechos y deveres de los alumnos
Musas do carnaval rj 2013
Catálogo marco estilo Enmarco2.0
Daemon Web Portals And Applications
Trabajo practico nº 5
Susurros nocturnos
Ad

Similar to Computer Based Crime (20)

PPT
Security At Home
PPT
091005 Internet Security
PPT
Keep Your Computers Safe And Secure
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PPTX
Computer security threats & prevention
PDF
What-is-computer-security
PPT
computer_security.ppt
PPTX
Internet Security
PPT
Cyber Security-Foundation.ppt
PPT
Computer security
PPTX
e-Security and malwares(virus, trojan and adware)
PDF
What is Network Security?
PDF
Getting users to care about security
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cybertestqas.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-.ppt
PPT
cs0123.ppt
Security At Home
091005 Internet Security
Keep Your Computers Safe And Secure
fundamentals of Cybersecurity Lesion 1.pdf
Computer security threats & prevention
What-is-computer-security
computer_security.ppt
Internet Security
Cyber Security-Foundation.ppt
Computer security
e-Security and malwares(virus, trojan and adware)
What is Network Security?
Getting users to care about security
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
cybertestqas.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-.ppt
cs0123.ppt

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
master seminar digital applications in india
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PPTX
Cell Structure & Organelles in detailed.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
master seminar digital applications in india
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Cell Structure & Organelles in detailed.
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Microbial diseases, their pathogenesis and prophylaxis
Anesthesia in Laparoscopic Surgery in India
GDM (1) (1).pptx small presentation for students
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Computer Based Crime

  • 1. Discovering God's Creation Science 10-12: Forensics: Crime Scene Investigation 21.5 Taylor Yarborough Computer Based Crime
  • 2. Top 10 Most Common Computer Based Crime FBI Scam Non-Delivery Merchandise Payment Advance Fee Fraud Identity Theft Overpayment Fraud Miscellaneous Scam & Fraud Spam Credit Card Fraud Auction Fraud Computer Damage CAPTCHA helps prevent spam by generating words that computer programs can’t read.
  • 3.  
  • 4. Where Are These Spammers?   Top Ten Countries By Count United States 66.1% United Kingdom 10.5% Nigeria 7.5% Canada 3.1% China 1.6% South Africa 0.7% Ghana 0.6% Spain 0.6% Italy 0.5% Romania 0.5%
  • 5. And Who Are The Targeting? 20-29 30-39 40-49 50-59 60+ -20
  • 6. What are the dangers? The danger for the average computer user is that someone will hack their system. Now, most average computer users don't have anything worth stealing. But now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer to use your computer as a site to break into something further on. Hack- to break into a computer system. Launching Pad- to use another computer to further hacking damage.
  • 7. How do we protect our computers? Keep Your Firewall Turned On:  A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers Install or Update Your Antivirus Software:   Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge.  Be Careful What You Download:  Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code. Keep Your Operating System Up to Date:  Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
  • 8. Protection Programs To Consider Comodo Internet Security Norton Internet Security
  • 9. Why do you think the 30-49 age group(s) are targeted most? Answer 1: “Because they’re old and don’t know how to work computers!” Sasja, Age 11 Answer 2: “They still think that everyone and everything should be trusted” Marie, Age 17 Answer 3: “