what is cyber crime
play

What is Cyber Crime? Cyber Enabled Crime Cyber Dependant Crime - PowerPoint PPT Presentation

R egional C yber C rime U nit DC Louise Gibson Prepare, Prevent & Protect What is Cyber Crime? Cyber Enabled Crime Cyber Dependant Crime Traditional crime that is enhanced in scale or Crimes that can only be committed solely reach by use


  1. R egional C yber C rime U nit DC Louise Gibson Prepare, Prevent & Protect

  2. What is Cyber Crime? Cyber Enabled Crime Cyber Dependant Crime Traditional crime that is enhanced in scale or Crimes that can only be committed solely reach by use of Computers with use of Technology and is also the target of the crime For example: Cyberbullying, Online Fraud, Online Grooming, Malicious Communications For example: Hacking, Ransomware, DDoSing

  3. What Is Cyber Crime? • Accessing stuff without permission E.g. Breaking into Computer Networks • Accessing stuff without permission intending to do something bad • Actually doing something bad to disrupt/impair computer functionality E.g. Distributed Denial of Service (DDOS) attack • Doing something so bad you cause a lot of material damage E.g. Wannacry Virus • Helping someone else o do bad stuff. • NOTE: You must use a computer to commit any of the above

  4. PREPARE PROTECT PREVENT PURSUE

  5. Prevent Objectives

  6. Cyber Prevent • Police • Social Services • Education • Youth Services • Charity/Volunteer Sector

  7. Referral Process • Where is it? • What do we do when we receive a referral? • What support/diversions can we offer?

  8. Case Study PREVENT Target A PREVENT Target B 1 2 3 4 1 2 3 4 1 1

  9. EMSOU have created their own cyber website which has resources for teachers, parents and children around cyber PROTECT Key Stage teaching modules/lesson plans developed to teach children about Computer Misuse Act offences

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend