Search Header Logo
CYBER CRIME

CYBER CRIME

Assessment

Presentation

Computers

7th Grade

Practice Problem

Hard

Created by

Jasmine Sharon

Used 94+ times

FREE Resource

24 Slides • 0 Questions

1

SKILL OF EXPLANATION

JASMINE SHARON S

I.B.Ed.

COMPUTER SCIENCE

Slide image

2

CRIME

Crime is an unlawful act punishable by a state or other authority.

3

Slide image

4

CYBER CRIME

Crime committed using a computer and the internet to steal data or information is called as cyber crime

Slide image

5

CATEGORIES OF CYBERCRIME

  • The Computer as a Weapon - Using a computer to commit real world crime e.g. Cyber terrorism, credit card fraud etc.

  • The Computer as a Target - Using a computer to attacks other computer. E.g.: Hacking, virus/worms attacks etc.

6

Q&A

What are the categories of cybercrime?

7

Slide image

8

Slide image

9

HACKING

Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker

Slide image

10

Slide image

11

CREDITCARD FRAUD

When an individual uses another individuals credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used. This problem occur while using online banking, shopping.

Slide image

12

Slide image

13

VIRUS DISSEMINATION

It is malicious software that attaches itself to other software.

Slide image

14

Slide image

15

COMPUTER VANDALISM

Damaging or destroying data rather than stealing and transmitting virus.

Slide image

16

Slide image

17

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs is called as Software Piracy.

Slide image

18

Q&A

Name the types of cyber crime?

19

TYPES OF CYBERCRIME

  • Hacking

  • Credit card Fraud

  • Virus dissemination

  • Computer Vandalism

  • Software piracy

20

Slide image

https://wordwall.net/play/15063/092/172


21

SAFETY TIPS

  • Use antivirus software

  • Never give your full name or address to strangers.

  • Uninstall unnecessary software

  • Maintain backup.

  • Learn more about Internet privacy.

  • Check security settings.

22

Slide image

https://wordwall.net/play/15062/679/572


23

Slide image


24

Slide image

SKILL OF EXPLANATION

JASMINE SHARON S

I.B.Ed.

COMPUTER SCIENCE

Slide image

Show answer

Auto Play

Slide 1 / 24

SLIDE