You are on page 1of 15

er crime awareness ts impacts r children)

Click to edit Master subtitle style

resented by: anisha upadhyay 8emccs46

3/27/12

Contents
What is CYBER CRIME? What is COMPUTER CRIME? Profile of CYBER CRIMINAL Victims Introduction to the internet

3/27/12

What is

CYBER CRIME ?

CYBER CRIME is initiated where:


Everybody is using COMPUTERS. From white collar criminals to terrorist Conventional

kidnapping

crimes

like

Forgery,

extortion,

etc. are being computers INTERNET.


3/27/12

committed with the help of

Monetary transactions are moving on to the

WHAT IS COMPUTER CRIME?


COMPUTER CRIME is any crime where

Computer is a target. Computer is a tool of crime Computer is incidental to crime


It happens because of : -

Computers storage capacity, Weakness in Operation System, Lack of Awareness of user.


3/27/12

Disgruntled employees. Teenagers. Political Hacktivist. Professional Hackers. Business Rival. Ex-Boy Friend. Divorced Husband. etc
3/27/12

Profile of Cyber Criminal

Victims

Gullible Desperados and greedy people Unskilled & Inexperienced Unlucky people

3/27/12

Introduction to the Internet


The Internet places a vast amount of

information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite stock etc. Internet increases throughout our nation and the world, the wrongful use of the Internet to commit crime and victimize people also increases.

However, as the legitimate use of the

3/27/12

Leads to Exploitation

Children and even adults, at times, can be

sexually exploited, kidnapped, and solicited by individuals using online service. One reason is the anonymous nature of the Internet. using the Internet. Pedophiles will make contact with victims by having children call collect so the pedophile's telephone number will not show up on their parent's telephone bill.

Another reason is the large number of people

3/27/12

Cont..
Pedophiles will also purchase a prepaid

telephone card and give children a toll free access number enabling children to call from anywhere they choose. Pedophiles will often convince children to send them a photograph. photograph and/or pose as professional photographers to obtain nude, graphic or sexually explicit photographs of children.

Pedophiles will offer children money for their

3/27/12

Cont.
The following are some examples: Choose an online service that offers parental

control features;

Purchase blocking software and design your

own safety system;


Monitor children that are online and monitor

the time they spend online;


Ensure children never reveal identifying

information about themselves on the Internet in a public chat room, on an electronic bulletin 3/27/12 board or in their e-mail messages;

Cont.
Teach children to never let anyone pressure

them into doing something they feel uncomfortable doing;

Teach children to never enter an area on the

Internet that charges for services without asking permission from a responsible adult first;

Some children have access to the Internet at

school. Check with the school authorities to ensure your children are properly supervised and monitored by a responsible adult; 3/27/12

Cont
If you become aware of the transmission, use,

or viewing of child pornography while online, report it to the National Center for Missing and Exploited Children; who they seem;

Teach children that people online may not be Teach children online service providers never

ask for passwords and they should never give their password out; the Internet may not be true;

Teach children that everything they read or


3/27/12 on see

Impact
Shock Disbelief Fear and terror Confusion and frustration Guilt or self blame Humiliation Sorrow
3/27/12

Survival Strategies
Rescuing must rescue others Fighting must remove danger Competing-must obtain scarce essentials Adapting-must surrender goals Asserting-must achieve goals Cooperating-must create scarce essentials.

3/27/12

Thank you
3/27/12

You might also like