
Cybercrime
Learn about cybercrime, including identity theft, phishing, scamming, and hacking. Discover how cybercriminals target individuals online and how to protect yourself from becoming a victim.
Uploaded on | 0 Views
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
CYBERCRIME YASMINE ABUHADBA 7-F
Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them.
CYBERCRIME METHODS: IDENTITY THEFT: ONLINE IDENTITY THEFT REFERS TO THE ATTACKER'S USE OF ONLINE PLATFORMS TO STEAL IDENTITIES AND COMMIT ONLINE FRAUD. THIS CAN RANGE FROM ATTACKS ON A USER'S SOCIAL MEDIA ACCOUNT OR E-COMMERCE PLATFORM.
PHISHING : PHISHING IS A TYPE OF SOCIAL ENGINEERING ATTACK OFTEN USED TO STEAL USER DATA, INCLUDING LOGIN CREDENTIALS AND CREDIT CARD NUMBERS. IT OCCURS WHEN AN ATTACKER, MASQUERADING AS A TRUSTED ENTITY, DUPES A VICTIM INTO OPENING AN EMAIL, INSTANT MESSAGE, OR TEXT MESSAGE.
SCAMMING: CYBER SCAMS ARE SCAMS THAT ARE CARRIED OUT ONLINE. THIS COULD BE THROUGH THINGS LIKE DODGY EMAILS AND WEBSITES, OR FAKE ACCOUNTS ON SOCIAL MEDIA.
HACKING: HACKING IS IDENTIFYING AND EXPLOITING WEAKNESSES IN COMPUTER SYSTEMS AND/OR COMPUTER NETWORKS. HACKERS USUALLY BREAK INTO COMPUTER SYSTEMS THAT HOLD A LOT OF PERSONAL INFORMATION.