SlideShare a Scribd company logo
How to stop computer crime
submitted to:
Sir inam-ul-haq
submitted by:
Amna Akram(3018)
University of education renala cumps
BSIT(Hons)evening semester -1
Computer crime
History
Types of Computer Crime
How to stop computer crime
Conclusion
References
DEFINING COMPUTER CRIME
 Crime committed using a computer and
the internet to steal data and
information.
 Illegal imports.
 Malicious programs.
HISTORY
 The first recorded computer crime took
place in the year 1820.
TYPES OF COMPUTER CRIME
 Hacking
 Denial of service Attack
 computer Viruses
 phishing
 Cyber Terrorism
 Identity Theft
How to stop computer
crime
Install protective software
 Shops is available as a free download for
Windows, Macintosh, and Linux from IS&T's
software page. When installed, the
software should be set to scan your files
and update your virus definitions on a
regular basis.
Choose strong passwords
 Choose strong passwords with letters,
numbers, and special characters to create a
mental image or an acronym that is easy
for you to remember. Create a different
password for each important account, and
change passwords regularly.
Protect your e-identity
 Be cautious when giving out personal
information such as your name, address, phone
number or financial information on the Internet.
Make sure that websites are secure (e.g. when
making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using
social networking sites).
Protect sensitive data
 Reduce the risk of identity theft. Securely remove
sensitive data files from your hard drive, which is
also recommended when recycling or repurposing
your computer. Use the encryption tools built into
your operating system to protect sensitive files
you need to retain.
Be Social-Media Savvy
 Make sure your social networking profiles
(e.g. Facebook, Twitter, Youtube, MSN,
etc.) are set to private. Check your security
settings. Be careful what information you
post online. Once it is on the Internet, it is
there forever!
Control access to your machine
 Don't leave your computer in an unsecured
area, or unattended and logged on,
especially in public places - including
Athena clusters and Quick stations. The
physical security of your machines just as
important as its technical security.
Use secure connections.
 When connected to the Internet, your data
can be vulnerable while in transit. Use
remote connectivity and secure file
transfer options when off campus.
Use email and the Internet safely.
 Ignore unsolicited emails, and be wary of
attachments, links and forms in emails that
come from people you don't know, or which
seem "phishy." Avoid untrustworthy (often
free) downloads from freeware or
shareware sites.
Secure your wireless network
 Wi-Fi (wireless) networks at home are
vulnerable to intrusion if they are not
properly secured. Review and modify
default settings. Public Wi-Fi, a.k.a. “Hot
Spots”, are also vulnerable. Avoid
conducting financial or corporate
transactions on these networks.
Conclusion
 Most of the really effective steps that a computer
user can take to avoid being a victim of crime make
the user's computer less convenient to use. Each
user must balance for himself/herself how much
security is enough, especially when faced with daily
inconvenience of high-level security measures vs.
the rare occurrence of attacks.
Further, the user must be aware that a determined
and creative criminal can defeat nearly any security
measure, so complete security is not possible.
REFERENCES
 wikipedia.org/wiki/Computer crime.
 www.rbs2.com/cvict.htm.
 www.forbes.com/sites/thesba/2013/08/28
/how-to-prevent-cyber-crime/.
 www.niagarapolice.ca/en/community/com
putercrimeprevention.asp.

More Related Content

PPTX
Internet security software
PDF
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPTX
Cyber-savvy Cyber-safety
PPTX
Computer Security Presentation
PPTX
Threats to Information Resources - MIS - Shimna
PPTX
Computer Security 101
PPTX
Cyber safety
Internet security software
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber-savvy Cyber-safety
Computer Security Presentation
Threats to Information Resources - MIS - Shimna
Computer Security 101
Cyber safety

What's hot (18)

PPTX
Cyber Security 03
PPT
Threats to an information system
PPT
Digital Security Slide Show
PPTX
Cyber safety and cyber security
PPTX
Network security
PPTX
Security system in banks
PPTX
Security in Banks and ATM's
PPT
PPTX
Cyber security by Anushka Jha
PPTX
Cyber crime and security
PPT
Cybercrime and security
PPTX
cyber_security
PPTX
Cyber security
PPTX
Network security # Lecture 1
PPTX
Internet security
PPTX
Cyber Crime and Security
PPTX
Cyber crime and its safety
Cyber Security 03
Threats to an information system
Digital Security Slide Show
Cyber safety and cyber security
Network security
Security system in banks
Security in Banks and ATM's
Cyber security by Anushka Jha
Cyber crime and security
Cybercrime and security
cyber_security
Cyber security
Network security # Lecture 1
Internet security
Cyber Crime and Security
Cyber crime and its safety
Ad

Similar to How to stop computer crime (20)

PPTX
Cyber crime and security
PPTX
Cyber crime & security
PPTX
Cyber crime and Security
PPTX
Cyber Security
PPT
COB4 Computer Crime
PPTX
Cyber security
PPT
Computer crime
PPTX
Infocrimeppt
PPTX
cyber crime
PPTX
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
DOCX
Information Technology, cybersecurity and protection.docx
PPTX
PPTX
iIIBF Cyber Security Presentation 2.pptx
PPTX
BCE L-3omputer security Basics.pptx
PPT
Cyber crime and cyber security
PPTX
Computer Crime
PPTX
Network Security Basics in networking to learn
PPTX
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
PPTX
computer security and its relationship to computer forensic
PPTX
Cyber crime ppt
Cyber crime and security
Cyber crime & security
Cyber crime and Security
Cyber Security
COB4 Computer Crime
Cyber security
Computer crime
Infocrimeppt
cyber crime
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Information Technology, cybersecurity and protection.docx
iIIBF Cyber Security Presentation 2.pptx
BCE L-3omputer security Basics.pptx
Cyber crime and cyber security
Computer Crime
Network Security Basics in networking to learn
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
computer security and its relationship to computer forensic
Cyber crime ppt
Ad

More from university of education,Lahore (20)

PPT
Activites and Time Planning
PPT
Classical Encryption Techniques
PPT
Activites and Time Planning
PPTX
OSI Security Architecture
PPTX
Network Security Terminologies
PPT
Project Scheduling, Planning and Risk Management
PPTX
Software Testing and Debugging
PPTX
PPT
Enterprise Application Integration
PPTX
PPTX
Itertaive Process Development
PPTX
Computer Aided Software Engineering Nayab Awan
PPTX
Lect 2 assessing the technology landscape
PPTX
system level requirements gathering and analysis
Activites and Time Planning
Classical Encryption Techniques
Activites and Time Planning
OSI Security Architecture
Network Security Terminologies
Project Scheduling, Planning and Risk Management
Software Testing and Debugging
Enterprise Application Integration
Itertaive Process Development
Computer Aided Software Engineering Nayab Awan
Lect 2 assessing the technology landscape
system level requirements gathering and analysis

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PPTX
Cell Types and Its function , kingdom of life
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
RMMM.pdf make it easy to upload and study
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Trump Administration's workforce development strategy
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
IGGE1 Understanding the Self1234567891011
Cell Types and Its function , kingdom of life
Weekly quiz Compilation Jan -July 25.pdf
RMMM.pdf make it easy to upload and study
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Trump Administration's workforce development strategy
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A systematic review of self-coping strategies used by university students to ...
Complications of Minimal Access Surgery at WLH
Chinmaya Tiranga Azadi Quiz (Class 7-8 )

How to stop computer crime

  • 1. How to stop computer crime submitted to: Sir inam-ul-haq submitted by: Amna Akram(3018) University of education renala cumps BSIT(Hons)evening semester -1
  • 2. Computer crime History Types of Computer Crime How to stop computer crime Conclusion References
  • 3. DEFINING COMPUTER CRIME  Crime committed using a computer and the internet to steal data and information.  Illegal imports.  Malicious programs.
  • 4. HISTORY  The first recorded computer crime took place in the year 1820.
  • 5. TYPES OF COMPUTER CRIME  Hacking  Denial of service Attack  computer Viruses  phishing  Cyber Terrorism  Identity Theft
  • 6. How to stop computer crime
  • 7. Install protective software  Shops is available as a free download for Windows, Macintosh, and Linux from IS&T's software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.
  • 8. Choose strong passwords  Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.
  • 9. Protect your e-identity  Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
  • 10. Protect sensitive data  Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.
  • 11. Be Social-Media Savvy  Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever!
  • 12. Control access to your machine  Don't leave your computer in an unsecured area, or unattended and logged on, especially in public places - including Athena clusters and Quick stations. The physical security of your machines just as important as its technical security.
  • 13. Use secure connections.  When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.
  • 14. Use email and the Internet safely.  Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don't know, or which seem "phishy." Avoid untrustworthy (often free) downloads from freeware or shareware sites.
  • 15. Secure your wireless network  Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.
  • 16. Conclusion  Most of the really effective steps that a computer user can take to avoid being a victim of crime make the user's computer less convenient to use. Each user must balance for himself/herself how much security is enough, especially when faced with daily inconvenience of high-level security measures vs. the rare occurrence of attacks. Further, the user must be aware that a determined and creative criminal can defeat nearly any security measure, so complete security is not possible.
  • 17. REFERENCES  wikipedia.org/wiki/Computer crime.  www.rbs2.com/cvict.htm.  www.forbes.com/sites/thesba/2013/08/28 /how-to-prevent-cyber-crime/.  www.niagarapolice.ca/en/community/com putercrimeprevention.asp.