CYBER CRIME:AN OVERVIEW
The Internet = A World of OpportunitiesLook what’s at your fingertips A way to communicate with friends, family, colleagues
Access to information and entertainment
A means to learn, meet people, and exploreOnline Security Versus Online SafetySecurity: We must secure our computers with technology in the same way that we secure the doors to our homes.Safety: We must act in ways that help protect us against the risks that come with Internet use.
Primary Online Risks and ThreatsTo FamiliesCyberbullies
File-sharing abuses
Invasion of privacy
Disturbing content
PredatorsTo PersonalInformationOnline fraud and phishing
Hoaxes
Identity theft
SpamTo ComputersViruses
Worms
Trojans
SpywarePrimary Threats to Computer SecurityViruses/WormsSoftware programs designed to invade your computer, and copy, damage, or delete your data.TrojansViruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information.SpywareSoftware that tracks your online activities or displays endless ads.
Primary Online Risks for ChildrenDisturbing ContentIf kids explore unsupervised, they could stumble upon images or information you may not want them exposed to.File-share AbuseUnauthorized sharing of music, video, and other files may be illegal, and download malicious software.CyberbulliesBoth children and adults may use the Internet to harass or intimidate other people.PredatorsThese people use the Internet to trick children into meeting with them in person.Invasion of PrivacyIf kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
Primary Threats to Personal Online SafetyPhishingE-mail sent by online criminals to trick you into going to fake Web sites and revealing personal informationSpamUnwanted e-mail, instant messages, and other online communicationIdentity TheftA crime where con artists get your personal information and access your cash and/or creditHoaxesE-mail sent by online criminals to trick you into giving them money
Steps You Can TakeYour computerTurn on the OS Internet firewall.Keep Windows or other OS up-to-date.Install and maintain antivirus software.YourselfPractice Internet behavior that lowers your risk.Manage your personal information carefully.Use anti-phishing and anti-spam technology built into the OS.Your familyTalk with your kids about what they do online.Set clear rules for Internet use.Keep personal information private.
Four Steps to Help ProtectYour ComputerTurn on Windows or other OS Internet firewallKeep Windows or other OS  up-to-dateInstall and maintain antivirus softwareInstall and maintain antispyware software
Turn on Windows Internet FirewallAn Internet firewall helps create a protective barrier between your computer and the Internetwww.microsoft.com/protect
Use Automatic Updates to Keep Software Up-to-dateInstall all updates as soon as they are available
Automatic updates provide the best protectionwww.microsoft.com/protect
Install and Maintain Antivirus SoftwareAntivirus software helps to detect and remove computer viruses before they can cause damage.
For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
Install and Maintain Antispyware SoftwareUse antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.www.microsoft.com/protect
Other Ways to Help Protect Your ComputerBack up your files regularlyRead Web site privacy statementsClose pop-ups using red “X”Think before you click
Back up Your FilesSave to CD/DVD, a USB drive, or other external source
Use a Web-based backup serviceThink Before You ClickBe cautious with e-mail attachments and links
Only download files from Web sites you trust,READ PRIVACY STATEMENTS AND ONLINE AGREEMENTS BEFORE YOU CLICK “YES”, “OK” OR “I UNDERSTAND”www.microsoft.com/protect

CYBERCRIME: AN OVERVIEW

  • 1.
  • 2.
    The Internet =A World of OpportunitiesLook what’s at your fingertips A way to communicate with friends, family, colleagues
  • 3.
    Access to informationand entertainment
  • 4.
    A means tolearn, meet people, and exploreOnline Security Versus Online SafetySecurity: We must secure our computers with technology in the same way that we secure the doors to our homes.Safety: We must act in ways that help protect us against the risks that come with Internet use.
  • 5.
    Primary Online Risksand ThreatsTo FamiliesCyberbullies
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
    SpywarePrimary Threats toComputer SecurityViruses/WormsSoftware programs designed to invade your computer, and copy, damage, or delete your data.TrojansViruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information.SpywareSoftware that tracks your online activities or displays endless ads.
  • 16.
    Primary Online Risksfor ChildrenDisturbing ContentIf kids explore unsupervised, they could stumble upon images or information you may not want them exposed to.File-share AbuseUnauthorized sharing of music, video, and other files may be illegal, and download malicious software.CyberbulliesBoth children and adults may use the Internet to harass or intimidate other people.PredatorsThese people use the Internet to trick children into meeting with them in person.Invasion of PrivacyIf kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 17.
    Primary Threats toPersonal Online SafetyPhishingE-mail sent by online criminals to trick you into going to fake Web sites and revealing personal informationSpamUnwanted e-mail, instant messages, and other online communicationIdentity TheftA crime where con artists get your personal information and access your cash and/or creditHoaxesE-mail sent by online criminals to trick you into giving them money
  • 18.
    Steps You CanTakeYour computerTurn on the OS Internet firewall.Keep Windows or other OS up-to-date.Install and maintain antivirus software.YourselfPractice Internet behavior that lowers your risk.Manage your personal information carefully.Use anti-phishing and anti-spam technology built into the OS.Your familyTalk with your kids about what they do online.Set clear rules for Internet use.Keep personal information private.
  • 19.
    Four Steps toHelp ProtectYour ComputerTurn on Windows or other OS Internet firewallKeep Windows or other OS up-to-dateInstall and maintain antivirus softwareInstall and maintain antispyware software
  • 20.
    Turn on WindowsInternet FirewallAn Internet firewall helps create a protective barrier between your computer and the Internetwww.microsoft.com/protect
  • 21.
    Use Automatic Updatesto Keep Software Up-to-dateInstall all updates as soon as they are available
  • 22.
    Automatic updates providethe best protectionwww.microsoft.com/protect
  • 23.
    Install and MaintainAntivirus SoftwareAntivirus software helps to detect and remove computer viruses before they can cause damage.
  • 24.
    For antivirus softwareto be effective, you must keep it up-to-date.Don’t let it expire
  • 25.
    Install and MaintainAntispyware SoftwareUse antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.www.microsoft.com/protect
  • 26.
    Other Ways toHelp Protect Your ComputerBack up your files regularlyRead Web site privacy statementsClose pop-ups using red “X”Think before you click
  • 27.
    Back up YourFilesSave to CD/DVD, a USB drive, or other external source
  • 28.
    Use a Web-basedbackup serviceThink Before You ClickBe cautious with e-mail attachments and links
  • 29.
    Only download filesfrom Web sites you trust,READ PRIVACY STATEMENTS AND ONLINE AGREEMENTS BEFORE YOU CLICK “YES”, “OK” OR “I UNDERSTAND”www.microsoft.com/protect
  • 30.
    Use the Red“X” to Close Pop-upsAlways use the red “X” in the corner of a pop-up screen.
  • 31.
    Never click “yes,”“accept,” or even “cancel,” because it could be a trick that installs software on your computer.Take Steps to Help ProtectYour FamilyTalk with your kids about what they do onlineSet clear rules for Internet useKeep personal information privateUse family safety software
  • 32.
    Talk with YourKids about Online RisksTalk frankly with your kids about Internet risks, including
  • 33.
  • 34.
  • 35.
  • 36.
    Empower them byteaching them how their own behavior can reduce those risks and help to keep them safe when they are onlineHelpful online resourceswww.staysafe.orgwww.getnetwise.org
  • 37.
    Pay Attention toWhat Your Kids Do OnlineKeep the computer in a central area
  • 38.
    Get to knowhow your kids use the Internet
  • 39.
    Let your kidsbe the teacher
  • 40.
    Teach kids totrust their instincts
  • 41.
    Encourage them toreport any problemsKeep Personal Information PrivateTeach children to check with you before sharing personal information online
  • 42.
    Monitor your children’sonline activities
  • 43.
    Teach your childrento report suspicious activity
  • 44.
    Help children chooseappropriate screen names and e-mail addressesSet Clear Rules for Internet UseDo not share files or open attachments
  • 45.
    Do not clicklinks in e-mail
  • 46.
    Treat others theway you want to be treated
  • 47.
    Stand up foryourself
  • 48.
    Respect other people’s property
  • 49.
    Never go aloneto meet an Internet “friend” in personTake Steps to Help Protect Your Personal InformationPractice Internet behavior that lowers your riskManage your personal information carefullyUse technology to reduce nuisances, and raise the alarm when appropriate
  • 50.
    Practice Internet Behaviorsthat Help Reduce Your RiskDelete spam, don’t open it
  • 51.
    Be on thelookout for online scams
  • 52.
    Use strong passwordsManagePersonal Information CarefullyDo not share personal information in e-mail or instant messages
  • 53.
    Use only secureand trusted Web sites
  • 54.
    Make sure youare where you think you are: Web sites can be faked
  • 55.
    Avoid financial transactionsover wireless networks
  • 56.
    When in public,stay privateUse Anti-Phishing and Anti-Spam TechnologyMost e-mail providers and programs, like Windows Live Hotmail® and Microsoft Outlook®, filter most spam
  • 57.
    Phishing Filter inInternet Explorer® 7 helps to block and warn about suspicious sitesIf Your Identity is StolenReport it
  • 58.
  • 59.
  • 60.
    Place fraud alerton credit reportsGet a copy of your credit reportand ensure your account is marked “fraud alert” and “victim’s statement”
  • 61.

Editor's Notes

  • #28 Use Anti-Phishing and Anti-Spam TechnologyInternet service providers, e-mail programs, and Web browsers get better all the time. They block billions of spam e-mails daily. For example, spam filters in Microsoft Outlook, Windows Live Hotmail, and Windows Live Messenger provide strong defenses against unwanted junk e-mail, instant messages, and images.Microsoft Outlook helps reduce the amount of spam in your Inbox by filtering junk mail into a special folder. You can review the mail in this folder to make sure no legitimate mail got filtered by accident, and you can add these legitimate senders to your approved sender list to make sure they don’t get filtered again. You should delete the rest of the mail in your junk mail folder without opening it.Internet Explorer 7 includes Phishing Filter technology, which blocks access to known fraudulent sites and warns you about potentially suspicious sites. You can also use Phishing Filter to report sites that you are suspicious about, so that these sites can be reviewed.OPTIONAL For example, Microsoft is using technical innovations to help prevent spam and phishing scams from ever reaching peoples’ inboxes. Safer e-mail: Microsoft is building e-mail technology that can be used in other products and services, which stops criminals from spoofing legitimate Web sites and hiding their identities. Currently, this technology helps to protect more than 200 million Windows Live Hotmail customers worldwide against online scams.Filtered e-mail: Microsoft uses technology to identify and remove vast quantities of spam before it is ever delivered. SmartScreen filtering technology blocks more than 3.2 billion spam e-mail messages per day worldwide in Hotmail alone. In addition, Microsoft provides monthly updates to the Outlook junk mail filters, to help customers better protect and manage their inboxes from spam and other e-mail-perpetrated scams.