ebook img

Technology in Action PDF

121 Pages·2014·4.11 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Technology in Action

Technology in Action Alan Evans • Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 7 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 1 Chapter Topics • Cybercrime and Identity Theft • Protecting Yourself from Computer Viruses • Protecting Digital Assets from Hackers • Managing Online Annoyances • Keeping Your Data Safe • Protecting Your Physical Computing Assets Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 2 Cybercrime and Identity Theft • Cybercrime: Any criminal action perpetrated primarily through the use of a computer – Programs damaging computers – Stealing identities online – Attacking corporate websites • Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 3 Cybercrime and Identity Theft (cont.) • Top categories of complaints – FBI-related scams – Identity theft – Nonauction/nondelivery of merchandise – Advance fee fraud • Complaints not related to fraud – Computer intrusions – Child pornography – Blackmail Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 4 Cybercrime and Identity Theft (cont.) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 5 Cybercrime and Identity Theft (cont.) • Identity theft: Occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account, and credit card information and runs up debt in your name Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 6 Cybercrime and Identity Theft (cont.) • Acts perpetrated by identity thieves – Counterfeiting existing credit and debit cards – Requesting changes of address on bank and credit card statements – Obtaining new credit cards and bank account in your name and writing bad checks and not paying off credit card balances – Obtaining medical services in your name – Buying a home with a mortgage in your name, then reselling the house Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 7 Cybercrime and Identity Theft (cont.) • Other methods used to obtain personal information – Stealing purses and wallets – Stealing mail or looking through trash for bank statements and credit card bills – Posing as bank or credit card company representatives – Installing skimming devices on ATM machines to record information Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 8 Cybercrime and Identity Theft (cont.) • MAAWG found that half of e-mail users in North America and Europe have opened spam • 46% of people who opened spam did so intentionally Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.