Download - Cybercrime | IT Secutiry
![Page 1: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/1.jpg)
CYBERCRIME: ARE YOU THE NEXT VICTIM?
![Page 2: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/2.jpg)
CYBERCRIME: ARE YOU THE NEXT VICTIM?
Tina Freestone
Chair of the Criminal Justice Degree Program
Grantham University
Sandra J. Putnam
Assistant Special Agent in Charge
Georgia Bureau of Investigation
![Page 3: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/3.jpg)
Cost of Cybercrime
Norton Cybercrime Report for 2011 431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer viruses and malware
![Page 4: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/4.jpg)
![Page 5: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/5.jpg)
Cost of Cybercrime
Norton Cybercrime Report for 2011 431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer viruses and malware
![Page 6: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/6.jpg)
What is Cybercrime?
Computers being used to commit crime
Computers as the target of a crime
Computers storing evidence of a crime that has been committed
![Page 7: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/7.jpg)
Types of Cybercrime
Child Pornography Human Trafficking Identity Theft Drugs Dealing Harassment/Threats Fraud/White Collar Crime Murder Theft
Viruses Malware Hacking Denial of Service Attacks Copyright Violations Cyber-Stalking Phishing Sexting
Traditional Crimes Technological Crimes
![Page 8: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/8.jpg)
Challenges to Law Enforcement Computer Literate Criminals
Availability of technology for low or no cost
Technology is pushing society into the information age
Who is responsible for policing the Internet? Jurisdiction of crime
Training and Equipment costs
Evidence Integrity Physical versus Digital Evidence
![Page 9: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/9.jpg)
How to Protect Yourself
Understand that cybercrime exist and your vulnerable
Protect your computer with the latest anti-virus and malware software
Use good passwords
Lock down all social networking sites to only be visible to “FRIENDS”
Run an annual credit report
Residential wireless router should be encrypted and password protected
![Page 10: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/10.jpg)
AN ICAC CASE STUDY
A GBI Internet Crimes Against Children Task Force Investigation into finding the identity of 3 little girls whose images were posted on the Internet.
![Page 11: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/11.jpg)
Investigations
![Page 12: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/12.jpg)
Questions
![Page 13: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/13.jpg)
Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.
We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:
[email protected] Freestone
![Page 14: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/14.jpg)
Grantham University and the Criminal Justice department Thank You for attending and participating in today's Webinar.
We encourage you to follow up with any questions you may have regarding Criminal Justice or Cybercrime:
[email protected] FreestoneIACP Conference Booth #4711
![Page 15: Cybercrime | IT Secutiry](https://reader035.vdocument.in/reader035/viewer/2022062418/554ee28cb4c905d1158b4e00/html5/thumbnails/15.jpg)
www.grantham.edu1.888.Y.GRANTHAM
Call to speak to a representative today.