You're about to create your best presentation ever

Computer Crime Powerpoint Templates

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Computer Crime

Transcript: Computer Crime Hijacking Spoofing Salami shaving Trojan Horse Definition is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. Trojan horses may allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan horse. Defacing Is an attack on a website that changes the visual appearance of the site. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. A message is often left on the webpage stating his or her pseudonym and the output from "uname -a" and the "id" command along with "shout outs" to his or her friends. Sometimes, the Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware. A high-profile website defacement was carried out on the website of the company SCO Group following its assertion that Linux contained stolen code. The title of the page was changed from "Red Hat v. SCO" to "SCO vs World," with various satirical content following Piggybacking Piggybacking refers to the action of accessing the Internet wirelessly without consent or knowledge of the owner of the access This practice is increasingly common for the proliferation of Wi-Fi access to the Internet. Usually, these disclosures do not have the proper security, for this reason anyone can join them Mail Bombing Internet usage, an e-mail bomb is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack. There are two methods of perpetrating an e-mail bomb: mass mailing and list linking. Mass mailing consists of sending numerous duplicate mails to the same email address. List linking signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. Denial of service atack What is a denial-of-service (DoS) attack? Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Symptoms and Manifestations The United States Computer Emergency Response Team defines symptoms of denial-of-service attacks to include: Unusually slow network performance (opening files or accessing web sites) Unavailability of a particular web site Inability to access any web site Dramatic increase in the number of spam emails received Methods of attack A DoS attack can be perpetrated in a number of ways. The five basic types of attack are: Consumption of computational resources, such as bandwidth, disk space, or processor time. Disruption of configuration information, such as routing information. Disruption of state information, such as unsolicited resetting of TCP sessions. Disruption of physical network components. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. How do you avoid being part of the problem? Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers: Install and maintain anti-virus software Install a firewall, and configure it to restrict traffic coming into and leaving your computer Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic. Software privacy Software piracy is the unauthorized use or distribution of software. There are several reasons not to use pirated or pirate software. It's illegal and there is liability on your part. It's risky. If the software is from an unauthorized source, you could be getting a program that is not fully functional. There won't be another version of the software if there is no revenue to put back into research and development. This revenue has made the product affordable to legitimate users. It isn't ethical. The following are the most common types of software piracy: End-user Piracy This occurs when users make additional copies of software without authorization. Unauthorized Resale Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers. Internet piracy Pirate websites that make software available for free download or in exchange for uploaded

COMPUTER CRIME

Transcript: COMPUTER CRIME What is Computer Crime? Computer crime, or cybercrime, refers to any crime that involves a computer and a network. CASES: One of the highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. A hacking group called the MOD (Masters of Deception), allegedly stole passwords and technical data from Pacific Bell, Nynex, and other telephone companies as well as several big credit agencies and two major universities. The damage caused was extensive, one company, Southwestern Bell suffered losses of $370,000 alone. Different kinds of Cybercrime Worms Spyware Trojans Adware Phishing Scams Computer Viruses Identity theft Why do people create these viruses: To distribute political message. To attack the products of specific companies.  Some of them consider their creations to be works of art,and see as a creative hobby. Financial gain from identity theft PROTECTION: • Keep you passwords complicated and even think about changing them on a regular basis. • Don’t give out too much personal information on your social networking sites. Protect your children by installing antivirus software parental controls. • Always make sure that you factor in the cost of antivirus software when buying a new PC. • Keep it updated • Never give out your personal information to anyone online.

PowerPoint Game Templates

Transcript: Example of a Jeopardy Template By: Laken Feeser and Rachel Chapman When creating without a template... http://www.edtechnetwork.com/powerpoint.html https://www.thebalance.com/free-family-feud-powerpoint-templates-1358184 Example of a Deal or No Deal Template PowerPoint Game Templates There are free templates for games such as jeopardy, wheel of fortune, and cash cab that can be downloaded online. However, some templates may cost more money depending on the complexity of the game. Classroom Games that Make Test Review and Memorization Fun! (n.d.). Retrieved February 17, 2017, from http://people.uncw.edu/ertzbergerj/msgames.htm Fisher, S. (n.d.). Customize a PowerPoint Game for Your Class with These Free Templates. Retrieved February 17, 2017, from https://www.thebalance.com/free-powerpoint-games-for-teachers-1358169 1. Users will begin with a lot of slides all with the same basic graphic design. 2. The, decide and create a series of questions that are to be asked during the game. 3. By hyper linking certain answers to different slides, the game jumps from slide to slide while playing the game. 4. This kind of setup is normally seen as a simple quiz show game. Example of a Wheel of Fortune Template https://www.teacherspayteachers.com/Product/Wheel-of-Riches-PowerPoint-Template-Plays-Just-Like-Wheel-of-Fortune-383606 Games can be made in order to make a fun and easy way to learn. Popular game templates include: Family Feud Millionaire Jeopardy and other quiz shows. http://www.free-power-point-templates.com/deal-powerpoint-template/ Quick video on template "Millionaire" PowerPoint Games Some games are easier to make compared to others If users are unsure whether or not downloading certain templates is safe, you can actually make your own game by just simply using PowerPoint. add logo here References Example of a Family Feud Template PowerPoint Games are a great way to introduce new concepts and ideas You can create a fun, competitive atmosphere with the use of different templates You can change and rearrange information to correlate with the topic or idea being discussed. Great with students, workers, family, etc. For example: With games like Jeopardy and Family Feud, players can pick practically any answers. The person who is running the game will have to have all of the answers in order to determine if players are correct or not. However, with a game like Who Wants to be a Millionaire, the players only have a choice between answers, A, B, C, or D. Therefore, when the player decides their answer, the person running the game clicks it, and the game will tell them whether they are right or wrong.

PowerPoint Game Templates

Transcript: Conservation of fishing cat Introduction of fishing cat Health: Fishing cats are susceptible to carnivore protoparvovirus, a disease known to kill them. This disease significantly damages the kidney, spleen and gastrointestinal tract of the body. The fishing cat is also vulnerable to diseases and medical conditions such as feline hemoplasmas, transitional cell carcinoma and canine distemper virus. Conservation Threats Wild life Shamim khan 2225138043 Bs Zoology 2022-2026 Since 2016, the fishing cat is listed as a vulnerable species on the IUCN Red List, as the global population is thought to have declined by around 30% in the years 2010–2015; the destruction of wetlands and killings by local people are major threats to the fishing cat.[1] The destruction of wetlands includes increased pollution or conversion for agricultural use and human settlements. The conversion of mangrove forests to commercial aquaculture ponds is a major threat in Andhra Pradesh, and in some places fishing cats are killed. Over-exploitation of local fish stocks and retaliatory killing by local people are also significant threats. The fishing cat is included on CITES Appendix II and protected by national legislation over most of its range. Hunting is prohibited in Bangladesh, China, India, Indonesia, Myanmar, Nepal, Pakistan, Sri Lanka, and Thailand. Hunting regulations apply in Laos. In Bhutan, Malaysia, and Vietnam, it is not protected outside protected areas, and no information is known about its legal protections in Cambodia. It is the state animal of the Indian state of West Bengal. Its survival depends on protection of wetlands, prevention of indiscriminate trapping, snaring and poisoning. fishing cat The fishing cat (Prionailurus viverrinus) is a medium-sized wild cat of South and Southeast Asia. It has a deep yellowish-grey fur with black lines and spots. Adults have a head-to-body length of 57 to 78 cm (22 to 31 in), with a 20 to 30 cm (8 to 12 in) long tail. Males are larger than females classification of fishing cat: Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Chordata Class: Mammalia Order: Carnivora Suborder: Feliformia Family: Felidae Subfamily: Felinae Genus: Prionailurus Species: P. viverrinus Characteristics: The fishing cat has a deep yellowish-grey fur with black lines and spots. Two stripes are on the cheeks, and two are above the eyes running to the neck with broken lines on the forehead. It has two rows of spots around the throat. The spots on the shoulder are longitudinal, and those on the sides, limbs and tail are roundish Endangered in Pakistan: In captivity: Fishing cat captive breeding programmes have been established by the European Association of Zoos and Aquaria and the American Association of Zoos and Aquariums. All the fishing cats kept in zoos around the world are listed in the International Studbook of the World Association of Zoos and Aquariums.Zoos in Thailand house around 30 individuals; birth rates are not particularly high.They have been placed in captivity as an "insurance population" due to their vulnerable status in the wild Taxonomy Topic: fishing cat Submitted to: Dr Najiya Al-Arifa Behaviour and ecology Phylogeny: Distribution and habitat: The fishing cat lives among dense vegetation near water and is thought to be primarily nocturnal. It is known to be a proficient long-distance and underwater swimmer. Adult males and females without dependent young are solitary. Females have been reported to range over areas of 4 to 6 km2 (1.5 to 2.3 sq mi), while males range over 16 to 22 km2 (6.2 to 8.5 sq mi). It has been observed resting in thick grassy habitats, often near a water body but sometimes far away from them. Adults have been recorded to vocalise "chuckling" sounds The fishing cat is broadly but discontinuously distributed in South and Southeast Asia. It predominantly inhabits densely vegetated wetlands around slow-moving bodies of water like swamps and marshes.These include low-salinity bodies such as oxbow lakes, and high-salinity ones such as tidal creeks and mangrove forests. Along these bodies of water, it conceals itself within the thick cover of forests, scrublands, reed beds, and grasslands. Most records are from lowland areas. Reproduction and development: Wild fishing cats most likely mate during January and February; most kittens in the wild were observed in March and April. However, fishing cats may mate as late as June. In captivity, the gestation period lasts 63–70 days; females give birth to an average of two to three kittens; the litter size can be as small as one to as large as four.

Now you can make any subject more engaging and memorable