Misuses of ICT Malpractice and crime © Folens 2008.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
By Andy Scott, Michael Murray and Adam Kanopa
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Be safe, Be Secure, Be Smart.... Be in Control!
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
General Purpose Packages
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Managing Money Workshop The National Autistic Society AGM
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
GCSE ICT SECURITY THREATS.
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
Online Safety! By: Michelle Deng.
Lesson 3 Safe Computing.
Legislation in ICT.
Topic 6: Issues Press F5 to view!
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
What is it? Why do I keep getting from Barracuda? SPAM.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Top Five Computer Related Crimes
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
G061 - Network Security.
Presentation transcript:

Misuses of ICT Malpractice and crime © Folens 2008

Malpractice and crime Malpractice means improper or careless practice or misconduct. Crime means all those acts which are against the law. Both malpractice and crime cause problems for ICT users. © Folens 2008

Examples of malpractice Not logging off – meaning others cannot use your computer. Giving passwords and user-IDs to others. Viewing inappropriate material (e.g., pornographic websites). Using social networking sites in the firm’s time. Using the ICT facilities for non-authorised work. © Folens 2008

Examples of crime Downloading copyright music, video, programs, etc., without permission. Hacking – unauthorised access to ICT systems. Introducing viruses onto ICT systems. Identity theft – using banking details to commit fraud. Stealing hardware. Deliberately damaging ICT systems. Transferring personal details to others without the permission of the person whom the data is about. © Folens 2008

Here is an e-mail. Read it carefully. Is it genuine? Identity theft Here is an e-mail. Read it carefully. Is it genuine? © Folens 2008

No the e-mail is not genuine So how can we tell? Did you spot the following? A proper logo (note it is easy to scan one in so this does not make it genuine). A genuine e-mail from a bank would address you by name and include part of your account number. Often your postcode is included in the e-mail. There are grammatical errors in this e-mail. The Nationwide is not a bank – it is a building society! © Folens 2008

Phishing ‘Phishing’ means fishing for personal information using e-mails such as this one. If you follow the link you are taken to a website where you will be asked to part with personal and banking information. The whole process is called identity theft. © Folens 2008

Clicking on the link in the e-mail https://olb2.nationet.com/Update/Verify/default2.asp? You were taken to a website Here you were asked to enter account details The URL had changed to this: http://www.immortalityguild.com/files/data/index.html © Folens 2008

The site that will steal your identity © Folens 2008

What would happen if you were a Nationwide customer and you entered these details? They could log into your on-line account. They can transfer all your money to their own account. Usually this will be done in another country. They could use the information to commit further frauds. Identity theft is a crime. © Folens 2008

An example of malpractice Using image editing packages such as Photoshop you can alter images. When celebrities are photographed the image is often edited to remove spots, wrinkles, etc. This means people can no longer believe what they see. © Folens 2008

Faked photo A government minister was late for a photo shoot. A photograph was taken of the people who were there and a photograph of the minister on his own was used to add him to the picture. © Folens 2008

Scams A scam is a scheme to con you out of your money. People who think up scams, called scammers, use ICT to help them. Scammers use: text messages e-mail websites © Folens 2008

Examples of scams E-mails saying you have won money or goods as a prize. You have to send money before the prize can be released. On-line flirting in chat rooms or dating sites. You make friends with someone who is a criminal who will extract money from you. Bogus health claims – drugs which promise cures for all ailments. Flirting text messages – you get a message saying you have a secret admirer. You have to dial a premium rate number to find out they do not exist. © Folens 2008

Bogus sites Some sites contain bogus information. They are set up as a joke. Young people may think they are true. Young people may rely on the information or include the incorrect information in project work. Sometimes it is hard to spot they are bogus. © Folens 2008

Examples of bogus sites © Folens 2008

Another bogus site © Folens 2008

Spam Spam is abuse of ICT systems to send unsolicited bulk messages. Messages can be instant messages, text messages or e-mail. Spam is a nuisance because: Time is spent reading/deleting messages. Internet service providers have to provide more capacity to cope with it and some of this cost is passed to us. © Folens 2008

How to prevent spam Do not reply to spam. Never buy anything from a spammer. Use your e-mail spam blocking features. Use a dedicated anti-spam program – these filter your e-mail by blocking those e-mails identified as spam. Most ISPs (Internet service providers) block spam before it reaches you. © Folens 2008

Hacking Is illegal access to ICT systems. Can be an internal or external threat. Is illegal under the Misuse of Computers Act 1990. Hackers often use keyboard loggers which fit in the cable between the keyboard and the computer. Loggers record passwords and user-ids as they are entered using the keyboard. Organisations use firewalls to prevent illegal access to their ICT systems using the Internet. © Folens 2008

Viruses Virus programs are written by malicious people and are designed to cause harm to ICT systems or cause annoyance to users. They spread quickly by copying themselves onto new computers. They vary in their payload – some simply display annoying messages while others will delete files. Viruses can be prevented and removed by the use of anti-virus software. © Folens 2008