Computer Crimes

advertisement
Computer Crimes
Security, Privacy, and Ethics
Online
Objective
Given instructions, the learner will discuss
the network and web security with 85%
accuracy.
Computer Crimes
• It is a criminal act committed through the use
of a computer.
Types of Computer Crimes
• Unauthorized use of a computer
• Infection of a computer by a malicious program (a
virus)
• Harassment and stalking on the computer
• Theft of computer equipment
• Copyright violations of a software
• Copyright violations of information found on the
internet (Sharing Copyright Music or MP3s)
Computer Fraud
• Is conduct that involves the manipulation of a
computer or computer data in order to obtain
money, property, or value dishonestly or to
cause loss.
• Examples of computer fraud include stealing
money from bank accounts and stealing
information from other people’s computer for
gain.
Signs of Computer Fraud
• Low staff moral: Unhappy staff members may
decide the company owes them.
• Unusual work patterns.
• Staff members who appear to be living
beyond their income.
Computer Hacking
• It involves invading
someone else’s
computer.
• Usually for personal
gain or just the
satisfaction of invading
someone else’s
computer.
• Hackers are usually
computer experts who
enjoy having the power
to invade someone
else’s privacy.
• They can steal money,
or change or damage
data stored on a
computer
Computer Virus
• A program that has
been written usually by
a hacker, to cause
corruption of data on a
computer.
• The virus is attached to
an executable file (like a
program file) and
spreads from one file to
another once the
program to executed
Types of Virus
•
•
•
•
Worm
Time Bomb
Logic Bomb
Trojan Horse
Worm
• A worm makes copies of itself, resulting in the
consumption of system resources that slows
down or actually halts task.
• Worms don’t know to attach themselves to
other files.
Time Bomb
• A time bomb is virus that does not cause its
damage until a certain date or until the system
has been booted a certain number of times.
Logic Bomb
• A logic bomb is a virus triggered by the
appearance or disappearance of specified
data.
Trojan Horse
• A Trojan horse is a virus
that does something
different from what that
is expected to do.
• It may look like it is
doing one thing while in
actuality it is doing
something quite
opposite (usually
something disastrous)
Protect Your Computer From
Viruses
• Use antivirus software. This
software should always run on your
computer and should be updated
regularly.
• Be careful in opening e-mail
attachments. It is a good idea to
save them to disk before reading
them so you can scan them.
• Don’t access files copied from
floppy disks or downloaded from
the Internet without scanning them
first.
Software Piracy
• The illegal copying or use
of computer programs.
• Software Programs come
with a license number or
key that are used to
install the program
correctly to register it
with the company online
before you can use the
program.
• Software that is offered
online at no cost is call
FREEWARE.
• SHAREWARE is also
available on the internet
at no cost to use for a
trial period, but then the
developer expects to be
paid a fee for the
software, which may have
taken many hours of
programming to develop.
Other Computer Crimes
• Theft of Computer Time
– This crime is committed when
an employee uses a
company’s computer for
personal use such as running
a small side business, keeping
personal records.
• Theft of output
– Using information you see on
someone’s else’s screen or
printout to profit unfairly.
– Data Diddling is changing
data before it is entered into
the computer or after it has
been entered into the
computer
Post – Qs?
• What is Computer Crimes?
– It is a criminal act committed through the use of a computer.
• What is Computer Fraud?
– Is conduct that involves the manipulation of a computer or computer data in
order to obtain money, property, or value dishonestly or to cause loss.
• Name one sign of computer fraud in a company.
– Low staff moral, Unusual work patterns, and living beyond their income
• What is a Hacker?
– It involves invading someone else’s computer.
• What is a Computer Virus?
– A program that has been written usually by a hacker, to cause corruption of
data on a computer.
• Name four types of Virus.
– Worm, Time bomb, Logic bomb, Trojan horse
• Name one other computer crime.
– Theft of Computer time and Theft of output
Computer Security
SECURITY ISSUES
Objective
• Given instructions, the learner will discuss the
network and web security with 85% accuracy.
Computer Security
• Computer security is
necessary in order to
keep hardware,
software, and data safe
from harm or
destruction.
• The best way to protect
data it to effectively
control the access to it.
• The most common form
of restricting access to
data is the use of
Passwords (Password
are used to protect data
against unauthorized
users).
Other Security Measures
• Electronic identification cards are used to gain
access to certain areas within a building or
department.
• Firewalls, which consist of special hardware a
software, protect individual companies’
network form external networks.
• Antivirus software are used to protect data on
your computer.
Other Security Measures for
Companies
• Institute a very selective
hiring process that
includes careful screening
of potential employee.
• Regularly back up data
and store it offsite.
• Employ Biometrical
Security Measures, which
examine a fingerprint, a
voice pattern, or the iris
or retina of the eye.
Cookies
• Small files that are
created when you visit a
Website and are stored
on your computer, then
accessed again the next
time you visit the site.
• It makes it easier for you
to use the website when
you return and it also
provides the Web owner
with information.
Spyware
• A program installed on your
computer without your
knowledge, usually when you
download a file.
• Spyware tracks your Web
habits and take control over
your computer and direct you
to websites.
• Spyware can be harmful as
well as annoying; firewalls
consisting of hardware and
software features can protect
your computer from
unauthorized spyware
programs.
Piracy
• Piracy is a theft of
intellectual property.
Laws that Protects Users
• The Copyright Act of 1976:
• Computer Matching &
Protects the developer of
Privacy Protection Act,
software.
1988: Regulates how
federal data can be used to
• Software Piracy and
determine whether an
Counterfeiting Amendment
individual is entitled to
• Electronic Communication
federal benefits.
Piracy Act, 1986: Prohibits the
• Many states also have laws
interception of data
governing computer
communication
crimes.
• Computer Fraud and Abuse
Act, 1986: Prohibits individuals
without authorization from
knowingly accessing a
company computer to obtain
records from financial
communication.
The Golden Rule
“Do unto other’s as you would have them do
unto you!”
Post – Qs?
• Why is computer security necessary?
– Computer security is necessary in order to keep hardware, software,
and data safe form harm or destruction?
• Name a law that has been passed to protect your computer?
– 1) Copyright Act of 1976, 2) Software Piracy and Counterfeiting
Amendment of 1983, 3) Electronic Commission Privacy Act, 1986, 4)
Computer Fraud and Abuse Act, 1986, and 5) Computer Matching &
Privacy Protection Act, 1988
• What is cookies?
– Small files that are created when you visit a Website and are stored
on your computer, then accessed again the next time you visit the
site.
• What is Piracy?
– Piracy is a theft of intellectual property.
• What is spyware?
– A program installed on your computer without your knowledge,
usually when you download a file.
Download