emad course project

12
MIS-course pro j ect From: Emad Abo El Enin To: Pro f Dr Ismail A . Taha

Upload: emad-aboeleinein

Post on 10-Apr-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 1/12

M I S - c o u r s e p r o j e c t

F r o m : E m a d A b o E l E n i n

T o : P r o f D r I s m a i l A . T a h a

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 2/12

 Agenda

What Is The Problem?

What Are The Categories Of Cyber 

crime? What Can Be Done?

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 3/12

I n t e r n e t c r i m e

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 4/12

What exactly is Internet crime?

Internet crime is a recently escalating form

of crime that started with the rise of the

Internet era. Any criminal activity, which iscarried out on the Internet or by means of 

the Internet, is generally termed as

Internet crime.

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 5/12

What are the various threats in the

cyberspace that I should be aware of ?

There are various ways in which criminal minds can use thepower of Internet to abuse and cheat people. Here is a list of some of the most dangerous criminal activities over the Internet:

 ± Hacking

 ± Viruses

 ± Pirating ± Illegal Trading

 ± Fraud

 ± Scams

 ± Money Laundering

 ± Prescription Drugs

 ± Defamatory Libel ± Cyber Stalking

 ± Cyber Terrorism

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 6/12

Where should I report an Internet

crime? The Internet Crime Complaint Center, which is a jointinitiative of the Federal Bureau of Investigation and theNational White Collar Crime Center, aims to serve as amedium to receive, develop, and refer criminal

complaints in Internet crime. The Internet CrimeComplaint Center also provides the cyber victims aneasy-to-use reporting mechanism. Other organizationsthat could be of help are Department of HomelandSecurity's National Infrastructure Coordinating Center,U.S. Computer Emergency Readiness Team, National

 Association of Attorney General's Computer Crime Pointof Contact List.

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 7/12

What are the ways to protect myself from

Internet crime?

Safe and anonymous Internet browsing is the key to stayaway from cyber crime

you should avoid giving away personal details like

credit card number, social security number, home address,

telephone number, and account passwords on theInternet.

Financial transactions should be carried out over theInternet only when you are assured about the credibilityof the website.

Online shopping from suspicious websites should beavoided.

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 8/12

Who are the people that I need to watch out

for? There are plenty of people who are waiting for easy victims over the Internet.

Here is a list of all such scams scandals and other menacing elements over the Internet.

Hackers

Scammers

Phishing

Spammers

PedophilesPornography

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 9/12

What are the easiest ways to

achieve Internet Safety? Safe Internet Browsing is the first and most important rule of Internet safety.

Maintaining maximum anonymity is always the safest option while browsingthe Internet or chatting.

Do not give out your address, telephone number, credit card number, socialsecurity number, passwords or even your complete name as long as it is notcompulsory.

Do not allow strangers access to your web camera and even while chattingwith strangers via n instant messenger, try and block suspicious users.

While shopping on the Internet, make sure you select a reliable website. Avoid shopping on websites that you have never heard of, or seem fishy toyou even if they are offering attractive deals.

Do not upload your photographs, videos and your personal information onsocial networking websites, which do not have privacy settings.

Avoid using the Internet café while carrying out important transactions over the Internet.

For a safe Internet browsing experience equip your personal computer withfiltering software, anti-virus and anti-spyware software, firewall detector anda pop-up blocker which will warn you and protect you against possibleonline perils.

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 10/12

Types of Computer Crimes

Hacking

Phishing

Computer Viruses Cyber stalking

Identity Theft

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 11/12

Terrorists Using the Internet As every parent knows, the Internet is full of 

useful information but is also rife with

dangerous information that the general publichas no business being able to access.

Potential terrorists can learn how to make

bombs how to break into secure buildings,

how to sneak through airport security

checkpoints, or even how to murder a soldier 

or dignitary, without ever leaving their home.This is a growing serious problem everywhere

around the world,

 Arabic television network Al-Arabia has aired

videotapes from Al Qaeda that show

terrorists training for attacks on American andcoalition troops in Afghanistan, and those

videos have been widely circulated on the

Internet.

8/8/2019 Emad Course Project

http://slidepdf.com/reader/full/emad-course-project 12/12

Thank You