Cyber Crime Protection Checklist [CCPC]
Cybercrime Risk Prevention Tool
The Cyber Crime Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user, their loved ones or business to assess their vulnerability and risk potential of being targeted. The Cyber Crime Protection Checklist assesses the probability of being disparaged, stolen from or infiltrated by iPredators, cyber terrorist or nefarious corporate competitors engaged in cyber criminal and/or cyber warfare activities.
The Cyber Crime Protection Checklist also investigates personal and/or corporate vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees/customers or nefarious corporate competitors.
Areas examined in the Cyber Crime Protection Checklist include identity theft potential, personal and financial information protection, ICT safety, cyber security and security breach potential.
CYBER SECURITY – CYBERCRIME PREVENTION
It is recommended to complete the Cyber Crime Protection Checklist on a quarterly basis and more frequently if known adversaries, corporate competitors or malevolent entities are suspected of engaging in possible cyber-attacks or personal/corporate disparagement. It is also strongly encouraged for businesses, professional & organizational structures and public figures to ensure their colleagues, associates and sub-contractors practice the same level of cyber crime protection. The Cyber Crime Protection Checklist also addresses the growth of mobile device technology and attempts by cyber criminals to infiltrate their target’s mobile devices.
Please note that the Cyber Crime Protection Checklist and all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools (14 Checklists) are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) weaknesses. The IPI tools (12 Inventories) are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology (ICT) vulnerabilities.
NOTE TO INTERNET SAFETY TOOL CONSUMERS
All iPredator Inc.’s internet safety tools are designed for diagnostics, data collection, investigation and education. Authored by Dr. Nuccitelli and a close group of fellow associates, over the course of 10 months and several thousand hours, each tool targets a specific group of online aggressors and targeted victims. Given the rapid growth of online assailants and as surprising as it may seem, these tools still stand alone as the only comprehensive, extensive and multi-functional assessments in the nation.
Although consumers must agree to a non-replication and commercial distribution license agreement, iPredator Inc. will work with, at no cost, assisting consumers in developing their own products and services commercial tools. iPredator Inc. is receptive to professional and organizational affiliations for the purposes of marketing and selling the IPI and IISC tools.
Given iPredator Inc. is comprised of professionals, academics, community advocates, proactive citizens and information security professionals and not “retail or e-commerce savvy”, all revenue generation strategies, investment suggestions and seed funding opportunities are welcomed. Feel free to review, download and disseminate iPredator Inc.’s Executive Summary, Business Plan and Seed Funding Proposal by scrolling to the base of this site’s Executive Summary page to download the PDF files. Suggestions and interested parties are requested to call  871-2416 or email iPredator founder, Dr. Nuccitelli at email@example.com.
IPREDATOR GOOGLE PLUS LINKS
[VISIT, JOIN & SHARING APPRECIATED]
- Google + Profile | Dr. Nuccitelli
- Google + Page | iPredator
- Google + Page | Dark Psychology
- Google + Page | Dr. Internet Safety
- Google + Community | iPredator
- Google + Community | Dark Psychology
Assessing Technology, Methods, and Information in Cybercrime
(CLICK IMAGE TO VISIT)
The IISC & IPI cyber attack risk assessments & educational tools are 26 checklists and inventories authored by NYS licensed psychologist, Michael Nuccitelli, Psy.D. Dr. Nuccitelli is also the author of the Information Age construct, iPredator, recognized by the American College of Forensic Examiners Institute, law enforcement & legal professionals, information security experts and educational institutions.
The primary difference between the IISC & IPI assessments is the IISC tools are all checklists in statement form, whereas the IPI inventories are in question form. The IISC tools are best suited for consumers who want to verify and confirm that internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics are in place for themselves, their business or the subject they are assessing.
The IPI tools are geared toward consumers seeking to inquire and/or assess as opposed to verifying internet safety, cyber security, stable psychological functioning and iPredator protection strategies and tactics. The IPI tools are formatted as questions and geared more towards initiating dialogue with other online users as opposed to confirming their practices are in place.
Note: The Cyber Crime Protection Checklist and iPredator Internet Safety Checklists (IISC) are available for purchase in both the full file version (IISC) and abridged version (IISC-ABR.) The full version checklists are the same tools, but also include a considerable amount of additional information and services for using the checklists for education, investigation, training and data collection. The abridged versions (IISC-ABR) have the entire tool for administration and correct scoring templates. Unlike the full version with scoring categories included, score comparison is reviewed here: http://ipredator.co/products/scoring-keys/
Cybercrime Threat & Risk Assessment
Dr. Nuccitelli designed the Cyber Crime Protection Checklist and all 26 checklists and inventories to be used as data collection, assessment, investigation and education tools. At present, the IPI & IISC Collections can be purchased here at the website and 13 of the tools (IISC-ABR) can be purchased in an abridged version. The primary difference is the full version checklists are the same tools, but also include a considerable amount of additional information and services for professionals and organizations using the checklists for education, investigation, training and data collection.
Dr. Nuccitelli has also compiled the entire 26 tools into one master file that can be purchased called the Master iPredator Cyber Risk Assessment – 26 (MICRA-26.) To purchase the master file, Dr. Nuccitelli requires a brief phone conversation prior to purchase. He can be reached by email at firstname.lastname@example.org or via phone at 347-871-2416. The central theme to all iPredator Inc. products and services is Dr. Nuccitelli’s theoretical construct, iPredator. A brief description of iPredator is as follows:
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using ICT. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in an abstract electronic universe.
Thank you for considering purchasing the Cyber Crime Protection Checklist or one of iPredator Inc.’s internet safety tools. As Dr. Nuccitelli is the author of all 26 checklists and inventories, he strongly encourages new owners to contact him to learn more and the multiple applications they can be used for and in what capacities. You can also contact him if you have questions prior to purchasing any of iPredator Inc.’s products and services. Dr. Nuccitelli offers consultation and advisory services, at no cost, to owners of his internet safety assessments. Feel free to email him at email@example.com or via phone at 347-871-2416.
PRWeb National Press Release May 09, 2013
Structured Cyber Crime Risk Assessment Released
An innovative Cyber Crime risk tool has been released for purchase by iPredator Inc. Developed by Michael Nuccitelli Psy.D., C.F.C., a New York State licensed psychologist and certified forensic consultant, the structured checklist for online users and businesses is used for cybercrime prevention, diagnostics, education and investigation.
Adult Online User & Professional Site Pages
- Cyber Deception
- Internet Addiction
- Internet Addiction Checklist
- Online Dating Safety Tips
- Online Reputation
- Internet Safety Library
- Cyber Attacker Checklist
- What is Cyberstalking
- Types of Cyberstalking
- iPredator Bridge
- Cyber Terrorism
- Homeland Security
- Social Networking Sites
- Internet Safety Dynamics
- Cyber Security Tips for Business
- Digital Reputation Tips for Business
- Dark Psychology
Internet Safety for Online Users | Tools, Education, Services
- Social Media Safety Assessment for Kids
- Online Predator Prevention | Professional Protection
- Internet Safety Assessments
- Cyber Attack Risk Assessments Overview
- Internet Safety Checklists | Parents Version
- Cyber Attack Prevention, Investigation, Consultation
- Continuing Education | Community Education
iPredator Inc. is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cyber crime, internet defamation, cyber terrorism, online sexual predation and the new field the founder is pioneering he has termed, Information Age Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
For online users interested in learning more about Dark Psychology & iPredator outside the website or forensic & internet safety blogs, please visit their iPredator & Dark Psychology Google + Community pages and all are welcomed to contribute. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, please email him at firstname.lastname@example.org or via phone at 347-871-2416.
- Google +: The iPredator
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
“As society becomes more technologically advanced, the importance of Information and Communications Technology (ICT) becomes vital in the daily living of humanity. Despite the multitude of benefits, the dangers lurking in cyberspace are real, growing and need to be stopped. It may take me 30-40 years, but I will diligently persist until one day online sexual predators, cyberstalkers and all iPredators experience fear before they proceed with their cyber attacks.” Michael Nuccitelli Psy.D., C.F.C., iPredator Inc. (2013)
- Michael Nuccitelli Psy.D., C.F.C.
- NYS Licensed Psychologist
- CEO, iPredator Inc.
- Website: www.iPredatorInc.com
- Email: DrNucc@iPredatorInc.com
- Ph: (347) 871-2416
Cyber Crime Protection Checklist by Michael Nuccitelli Psy.D.,