E N D
COMPUTER CRIMES & INTERNET FRAUD BY Ahmed NazimuddinQureshi O-I Mohsin Khalid O-I M. BilalAslam O-I Zain Ali O-I
Types of computer crimes • Fraud achieved by the manipulation of computer records. • Spamming wherever outlawed completely or where regulations controlling it are violated. • Deliberate circumvention of computer security systems • Unauthorized access to or modification of programs (software cracking and hacking) and data. • Intellectual property theft, including software piracy. • Industrial espionage by means of access to or theft of computer materials. • Identity theft where this is accomplished by use of fraudulent computer transactions. • Writing or spreading computer viruses or worms.
Always keep backup.Make backup copies at least every 6 months. • Before disposing of an old computer, by donation or sale: delete all data and document files. • delete all application programs (to avoid software piracy). • run WIPEINFO, in Norton Utility for DOS version 8 (or the corresponding version for the Apple Macintosh), to overwrite all of the free space on the hard disk, thus making it difficult to recover your data and document files. • Stay updated and informed ,as technology progresses, so does cyber crime.
PREVENTION IS BETTER THAN CURE • Select a good password • Avoid obvious passwords • Use credible Anti-Virus Software, update regularly. • Be wary of attachments in e-mail • Use one to two Firewalls • Do not enter sensitive data on public PCs • Avoid shady sites • Prefer to access sites with https instead of http • Never give out your real name, address, city, telephone number, or other identifying information to a stranger in a chat room, computer bulletin board, or other public place.
HACKING Is your system ?
Hacking techniques • There are two types of techniques: • PHISHING: • PHARMING
Safeguarding • Turn on your firewall. • Installing anti-spyware and antivirus software. • Login id • USB sticks