Thursday, 13 February 2014

















RILIWAN-ADEBOWALE-OGUNSOLA

Blog Entry.

3 1/1/14













CARD FRAUD
 Card fraud is a type theft and fraud committed using a credit card. Card fraud is also an adjunct to identity theft.
Card fraud begins either with the theft of the physical card or with the compromise of data associated with the account, including the card account number or other information that would routinely and necessarily be available to a merchant during a legitimate transaction.
When a credit card is lost or stolen, it may be utilized for illegal purchases until the holder notifies the issuing bank that the card is lost.
 
 
 
 
How to stop card defrauding



 When cards are lost or stolen and used fraudulently
Card-not-present' fraud which can occur online, by fax or phone using stolen card details
 Fake emails designed to elicit your details.
 Fake online banking websites designed to mimic bank

IDENTITY THEFT

Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity. it can also be a means of identification  with the intent to commit or any unlawful activity that constitutes a violation of federal law.
There are many types of Identity theft; Criminal identity theft, Financial identy theft, Medical identity theft and Child identity theft.


Financial Theft; inancial ID theft happen when a thief steals an individual’s personal identity and commits a crime that results in financial injury to the victim. Information can include name, bank account number, credit card numbers, Social Security number, and other personal financial data.





Medical Identity theft;Medical identity theft occurs when someone steals your personal information (like your name, Social Security number, or Medicare number) to obtain medical care, buy drugs, or submit fake billings to Medicare in your name
It also ocurs when someone seeks medical under the identity of another person.








COMPUTER VIRUSES
Computer viruses are malicious software programs that copy itself to another computer program. It can be transmitted as attachment on an e-mail note or in a download file, or be present on a diskette  or CD.

Nowadays many people install antivirus software that can detect and eliminate known viruses when the computer attempts to download which may be distributed as an email attachment, or on USB flash drive. Some antivirus software blocks known malicious web sites that attempt to install malware. To prevent computer form getting viruses, someone need to keep the antivirus updated.
 



HACKING
Hacking means is to illegally access other people's computer system in other to destroy or carry out something illegal.
 
BULLYING

Bullying may be defined as the activity of repeated, aggressive behavior intended to hurt another person, physically or mentally. There are many types of bullying e.g Cyberbulling, School bullying ,Military bullying et.c







GROOMING

Grooming is a gang of men and boys convicted of sexually abusing teenager girls. Sexual grooming occurs online.





INCLUSION
 
Inclusion is the process whereby the participation of students is increased and their exlusion from curricula, cultures and communitiies of local school is reduced.