SlideShare a Scribd company logo
Protect Yourself From Cybercrime
We’re pretty dependent on technology these days – not only for
communication, but also for financial transactions. A lot of us do our
shopping and banking online. This is very convenient, but it means we’re
more vulnerable to cybercrime. The good news is that you can protect
yourself by taking a few simple precautions.
vulnerable = open to being attacked
One of the most common cybercrimes out there is called phishing. The
victim receives an official-looking email that seems like it comes from a
legitimate source – like a bank, a store, or a government institution. The
subject line of the email will try to scare you – for example, it might say
that there’s a problem with your account, or that they need to confirm
some details or else you’ll lose your account.
legitimate = real, can be trusted
The email contains links that appear to go to a website where you can sort
things out. But instead of going to the real bank’s or company’s website,
the links lead to an imitation website. It might even have a deceptively
similar address. If you don’t notice you’re on a fake site, you would fill in
sensitive information like your credit card number or password – and when
you do, the data is sent to the bad guys.
If you get a message that something’s wrong with your bank account, the
best thing to do is to open a new window and go directly to your bank’s
website – type the address yourself. You can also call the bank or visit
personally to find out if there’s really an issue. This simple step will prevent
your personal information from being stolen.
Another way that cybercrime can affect you is if your computer gets a virus
or “malware” (that’s malicious software). Some viruses can erase your files
or make your computer run slowly. Others track your typing so they can
discover your passwords.
You can keep your computer virus-free by using a bit of common sense.
Never install programs from websites that look like they weren’t made by
legitimate companies. Don’t download email attachments from senders
you don’t know. If a friend sends you a message that seems out of
character, it’s possible that their computer may have been hacked. Finally,
install anti-virus software that can monitor and protect your computer.
out of character = not normal, considering their personality
hacked = when a computer system is invaded by criminals
A more subtle form of cybercrime is called “social engineering.” The
criminals do research on you by using the information you’ve posted
online. They want to find details like your birthday, where you were born,
anniversary date, spouse’s or children’s names, etc.
spouse = husband or wife
They can then use this to steal your identity – such as by calling your bank
pretending to be you and claiming to have lost the password for your
online account. To prevent this, set your social media profiles to “private,”
only accept friend requests from people you know, and try to minimize the
amount of personal stuff you share online.
You don’t have to be paranoid about cybercrime, but it’s best to be aware
so you can avoid becoming a victim. If something seems fishy, listen to
your instincts. It’s better to be safe than sorry.
paranoid = excessively worried
fishy = suspicious
instincts = your deep basic feelings

More Related Content

PPTX
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
DOCX
Identity theft in the internet
PPTX
PHISHING attack
DOCX
Online secuirty
PPT
Introduction to phishing
PPT
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
PPTX
Internet issues
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Identity theft in the internet
PHISHING attack
Online secuirty
Introduction to phishing
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Internet issues
 

What's hot (19)

PPTX
Phishing technology
PDF
PhishingandPharming
PPTX
Internet use issues
PPTX
Phishing Attack : A big Threat
PDF
CDSE Cybsecurity Awareness Posters
PPTX
Phishing, Pharming, Clickjacking
PPTX
The Difference between Pharming and Phishing
PPTX
Phising a Threat to Network Security
PPTX
A presentation on Phishing
PPT
Identity Theft
PPT
Train Employees to Avoid Inadvertent Cyber-Security Breaches
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
ODT
How to identify unsafe websites
PPTX
Phishing Attacks - Are You Ready to Respond?
 
PDF
What is a phishing attack
PPSX
What Are My Risks
 
PPTX
Identity theft
PDF
Phishing & Cyber Attack Awareness
Phishing technology
PhishingandPharming
Internet use issues
Phishing Attack : A big Threat
CDSE Cybsecurity Awareness Posters
Phishing, Pharming, Clickjacking
The Difference between Pharming and Phishing
Phising a Threat to Network Security
A presentation on Phishing
Identity Theft
Train Employees to Avoid Inadvertent Cyber-Security Breaches
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
IDENTIFYING CYBER THREATS NEAR YOU
How to identify unsafe websites
Phishing Attacks - Are You Ready to Respond?
 
What is a phishing attack
What Are My Risks
 
Identity theft
Phishing & Cyber Attack Awareness
Ad

Similar to Cybercrime (20)

PPTX
Unit 3 - Cyber Crime.pptx
PDF
PDF
Is this a scam.pdf
PDF
You Have the Power to Stop Identity Theft
PDF
You Can Fight Identity Theft
PDF
Identity Theft: Evolving with Technology
PPTX
Cyber safety.pptx
 
PPTX
IS Presetation.pptx
PPT
Internet Safety
PPTX
How to prevent identity fraud
PPTX
Identity fraud
PPTX
Identity fraud
PPTX
Cyber crime ppt
PDF
IWC - Phishing and Internet Scams
PPT
Identity theft power_point
PDF
Fraud Awareness Guide for Individuals
PPTX
Phishing
PDF
Identity Privacy 101 - Quicken Loans Zing Blog
PPSX
Multimedia12 by aparajeeta
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Unit 3 - Cyber Crime.pptx
Is this a scam.pdf
You Have the Power to Stop Identity Theft
You Can Fight Identity Theft
Identity Theft: Evolving with Technology
Cyber safety.pptx
 
IS Presetation.pptx
Internet Safety
How to prevent identity fraud
Identity fraud
Identity fraud
Cyber crime ppt
IWC - Phishing and Internet Scams
Identity theft power_point
Fraud Awareness Guide for Individuals
Phishing
Identity Privacy 101 - Quicken Loans Zing Blog
Multimedia12 by aparajeeta
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Ad

More from Karina Moreno Verpeide (20)

PDF
Can Paul fly a helicopter-Can Paul f.pdf
PDF
TEXTOS BEGINNERS-1-TEXTOS BEGINNERS-.pdf
PDF
TEXTOS BEGINNERS-2a-TEXTOS BEGINNERS.pdf
PDF
TEXTOS BEGINNERS-1a-TEXTOS BEGINNERS.pdf
PDF
TEXTOS BEGINNERS-1-TEXTOS BEGINNERS1.pdf
PDF
First Conditional-texts-First Condit.pdf
PDF
TEXTOS-MEMORIZAR-1-TEXTOS-MEMORIZAR-.pdf
PDF
first-cond-2-first-cond-2-first-cond.pdf
PDF
first-cond-1-first-cond-1-first-cond.pdf
PDF
Present progressive-4-Present progre.pdf
PDF
Present progressive-3-Present progre.pdf
PDF
Present progressive-2-Present progre.pdf
PDF
ELVIS PRESLEY-Karina-ELVIS PRESLEY-K.pdf
PDF
simple past-1-simple past-1-simple p.pdf
PDF
Past Story-6-Past Story-6-Past Story.pdf
PDF
Past Story-5-Past Story-5-Past Story.pdf
PDF
Past Story-4-Past Story-4-Past Story.pdf
PDF
Past Story-3-Past Story-3Past Story-.pdf
PDF
Past Story-2-Past Story-2-Past Story.pdf
PDF
Past Story-1-Past Story-1-Past Story.pdf
Can Paul fly a helicopter-Can Paul f.pdf
TEXTOS BEGINNERS-1-TEXTOS BEGINNERS-.pdf
TEXTOS BEGINNERS-2a-TEXTOS BEGINNERS.pdf
TEXTOS BEGINNERS-1a-TEXTOS BEGINNERS.pdf
TEXTOS BEGINNERS-1-TEXTOS BEGINNERS1.pdf
First Conditional-texts-First Condit.pdf
TEXTOS-MEMORIZAR-1-TEXTOS-MEMORIZAR-.pdf
first-cond-2-first-cond-2-first-cond.pdf
first-cond-1-first-cond-1-first-cond.pdf
Present progressive-4-Present progre.pdf
Present progressive-3-Present progre.pdf
Present progressive-2-Present progre.pdf
ELVIS PRESLEY-Karina-ELVIS PRESLEY-K.pdf
simple past-1-simple past-1-simple p.pdf
Past Story-6-Past Story-6-Past Story.pdf
Past Story-5-Past Story-5-Past Story.pdf
Past Story-4-Past Story-4-Past Story.pdf
Past Story-3-Past Story-3Past Story-.pdf
Past Story-2-Past Story-2-Past Story.pdf
Past Story-1-Past Story-1-Past Story.pdf

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Classroom Observation Tools for Teachers
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Structure & Organelles in detailed.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
2.FourierTransform-ShortQuestionswithAnswers.pdf
Complications of Minimal Access Surgery at WLH
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Classroom Observation Tools for Teachers
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Structure & Organelles in detailed.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf

Cybercrime

  • 1. Protect Yourself From Cybercrime We’re pretty dependent on technology these days – not only for communication, but also for financial transactions. A lot of us do our shopping and banking online. This is very convenient, but it means we’re more vulnerable to cybercrime. The good news is that you can protect yourself by taking a few simple precautions. vulnerable = open to being attacked One of the most common cybercrimes out there is called phishing. The victim receives an official-looking email that seems like it comes from a legitimate source – like a bank, a store, or a government institution. The subject line of the email will try to scare you – for example, it might say that there’s a problem with your account, or that they need to confirm some details or else you’ll lose your account. legitimate = real, can be trusted The email contains links that appear to go to a website where you can sort things out. But instead of going to the real bank’s or company’s website, the links lead to an imitation website. It might even have a deceptively similar address. If you don’t notice you’re on a fake site, you would fill in sensitive information like your credit card number or password – and when you do, the data is sent to the bad guys.
  • 2. If you get a message that something’s wrong with your bank account, the best thing to do is to open a new window and go directly to your bank’s website – type the address yourself. You can also call the bank or visit personally to find out if there’s really an issue. This simple step will prevent your personal information from being stolen. Another way that cybercrime can affect you is if your computer gets a virus or “malware” (that’s malicious software). Some viruses can erase your files or make your computer run slowly. Others track your typing so they can discover your passwords. You can keep your computer virus-free by using a bit of common sense. Never install programs from websites that look like they weren’t made by legitimate companies. Don’t download email attachments from senders you don’t know. If a friend sends you a message that seems out of character, it’s possible that their computer may have been hacked. Finally, install anti-virus software that can monitor and protect your computer. out of character = not normal, considering their personality hacked = when a computer system is invaded by criminals A more subtle form of cybercrime is called “social engineering.” The criminals do research on you by using the information you’ve posted
  • 3. online. They want to find details like your birthday, where you were born, anniversary date, spouse’s or children’s names, etc. spouse = husband or wife They can then use this to steal your identity – such as by calling your bank pretending to be you and claiming to have lost the password for your online account. To prevent this, set your social media profiles to “private,” only accept friend requests from people you know, and try to minimize the amount of personal stuff you share online. You don’t have to be paranoid about cybercrime, but it’s best to be aware so you can avoid becoming a victim. If something seems fishy, listen to your instincts. It’s better to be safe than sorry. paranoid = excessively worried fishy = suspicious instincts = your deep basic feelings