0% found this document useful (0 votes)
52 views14 pages

Chapter 3

The chapter discusses various types of internet fraud like investment scams and auction fraud. It covers identity theft and how personal information can be stolen. The chapter also explains cyber stalking and provides tips to secure web browsers and protect against fraud, identity theft, auction fraud, and cyber stalking.

Uploaded by

usmanashraf071
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views14 pages

Chapter 3

The chapter discusses various types of internet fraud like investment scams and auction fraud. It covers identity theft and how personal information can be stolen. The chapter also explains cyber stalking and provides tips to secure web browsers and protect against fraud, identity theft, auction fraud, and cyber stalking.

Uploaded by

usmanashraf071
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Security

Fundamentals

by Chuck Easttom

Chapter 3 Cyber Stalking, Fraud, and Abuse


Chapter 3 Objectives

 Know the various types of Internet investment


scams and auction frauds
 Know specific steps youcan take to avoid
fraud on the Internet
 Have an understanding of what identity theft
is and how it is done
 Know specific steps that can be taken to
avoid identity theft

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 2


Chapter 3 Objectives- Cont.

 Understand what cyber stalking is, and be


familiar with relevant laws
 Know how to configure a web browsers
privacy settings
 Know what laws apply to these computer
crimes

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 3


Internet Fraud Works

 Investment Scams
 Auction Frauds
 Shill bidding
 Bid shielding
 Bid siphoning
 Identity Theft
 Phishing
 Cross-Site Scripting

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 4


Cyber Stalking

 What is it?
 Real-world cases

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 5


Laws About Internet Fraud
 18 U.S.C. 1028, also known as The Identity
Theft and Assumption Deterrence Act of
1998
 State laws against cyber stalking

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 6


Protecting Against Investment
Fraud
 Only invest with well-known, reputable brokers.
 If it sounds too good to be true, then avoid it.
 Ask yourself why this person is informing you of
this great investment deal. Why would a
complete stranger decide to share some
incredible investment opportunity with you?
 Remember that even legitimate investment
involves risk, so never invest money that you
cannot afford to lose.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 7


Protect Yourself Against Identity
Theft
 Do not provide your personal information to
anyone if it is not absolutely necessary.
 Destroy documents that have personal
information on them.
 Check your credit frequently.
 If your state has online driving records, then
check yours once per year.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 8


Secure Browser Settings

 Internet Explorer
 Firefox
 Chrome

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 9


Protect Yourself Against Auction
Fraud
 Only use reputable auction sites.
 If it sounds too good to be true, don’t bid.
 Some sites actually allow you to read
feedback other buyers have provided on a
given seller. Read the feedback, and only
work with reputable sellers.
 When possible use a separate credit card
(one with a low limit) for online auctions.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 10


Protect Yourself Against Cyber
Stalking
 If you use chat rooms, discussion boards,
and so forth, do not use your real name. Set
up a separate email account with an
anonymous service, such as Yahoo!, Gmail,
or Hotmail. Then use that account and a fake
name online. This makes it hard for an online
stalker to trace back to you personally.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 11


Protect Yourself Against Cyber
Stalking (cont.)
 If you are the victim of online harassment,
keep all the e-mails in both digital and printed
format. Use some of the investigative
techniques you explore later in this book to
try toidentify the perpetrator. If you are
successful, then you can take the e-mails and
the information on the perpetrator to law
enforcement officials.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 12


Protect Yourself Against Cyber
Stalking (cont.)
 Do not, in any case, ignore cyber stalking.
According to the Working to Halt Online
Abuse Web site,19 % of cyber stalking cases
escalate to stalking in the real world.

© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 13


Summary
 Clearly, fraud and identity theft are real and
growing problems. In this modern age of
instant access to information and online
purchasing, it is critical that everyone takes
steps to protect themselves against this
issue.
 Cyber stalking is one area that is often new to
both civilians and law enforcement.
Unfortunately, cyber stalking cases can
escalate into real-world violence.
© 2012 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse 14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy