FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
POSSIBLE THREATS TO DATA
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Prepared by: Nahed Al-Salah
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Section 6 Theory Software Copyright, Viruses and Hacking.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Unethical use of Computers and Networks
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Internet Safety Internet Safety LPM
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Learning Intention Legislations impact on security of information
Done by… Hanoof Al-Khaldi Information Assurance
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Topic 6: Issues Press F5 to view!
Year 10 ICT ECDL/ICDL IT Security.
COMPUTER CRIME.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
HOW DO I KEEP MY COMPUTER SAFE?
Information Systems for Health:
Presentation transcript:

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Information Systems Malpractice and Crime

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Computer Crime Crime is defined as an action that breaks laws passed by Parliament i.e. Crime is illegal Theft of money Theft of data Theft of resources Vandalism Theft of Identity Computer Crime is any criminal act that is committed using ICT Credit card skimming Hacking Zombie computers Viruses/DoS attacks Identity Theft (Duh!)

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Money The growth of electronic commerce and the cashless society has led to a growth in theft of money using cloned credit/debit cards Skimming is a process where the details from a genuine cards magnetic strip are copied onto a fake card Card details can be obtained by dishonest employees in shops, bars and restaurants Card details can also by obtained through fake cash machines

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Chip and Pin Chip and Pin is an attempt to reduce the growth of credit and debit card fraud Because its so easy to clone the magnetic stripe on a card additional measures are needed Chip and pin cards contain a working chip which is much harder to counterfeit Cloned cards are less use unless a thief knows your pin number (which is why its essential you guard your pin when using an ATM or making a purchase in a store)

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Data Data can be the most valuable commodity a business has! Loss of corporate data can lead to: Increased cost for the organisation (to recreate data) Competitive advantage for competitors Hacking is unauthorised access to data held on a computer system. Hacking is an offence under the Computer Misuse Act 1990 Theft can also be physical i.e. the theft of hardware containing data See this BBC article about the possible consequences of laptop theftBBC article

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Resources By planting malware on a computer (via or website) a criminal can take control of it remotely The criminal can then use the Zombie computer to carry out illegal activities including Denial of Service attacks and spamming. Computer resources (processing power/bandwidth etc) are expensive so cybercriminals will often attempt to take over the PCs of innocent web surfers to carry out their illegal activities Protect yourself by always using a firewall and up-to-date anti virus software

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Vandalism Viruses are developed to cause damage to computer files and systems. May overwrite or delete files. Look at this Teach-ICT mini site for a more detailed description of virusesTeach-ICT In a fairly recent development mobile phones are increasingly becoming the target of virus creators

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Identity Identity Theft is on the increase With enough personal details criminals can impersonate you to obtain credit cards, loans and goods in your name i.e. youll be left to pick up the bill! Phishing is a very common method of trying to get you to divulge personal details by . Personal details can also be obtained from discarded bills and receipts

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Other Offences 1 Denial of Service Attack: A web site is flooded with data with the intention of making it crash, preventing legitimate users from gaining access. Considerable financial losses could occur during the time the site is down. Online Fraud: Non existent businesses set up on the Internet to sell non existent goods. If it looks too good to be true it probably is! Pornography & Paedophilia: Posting and downloading of obscene images and news items, the use of newsgroups and chat rooms to illegally entrap vulnerable children.

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Other Offences 2 Cyber-stalking: Unwanted persistent from an unwanted source. Hate sites: Websites run by extremists to promote their views, personal details may be published to endanger the safety of their targets. Includes animal rights, terrorists, racists, etc. Copyright Infringements The growth of the Internet has made it easier to illegally copy and distribute copyright materials such as music, movies and software more easily – in breach of the Copyright, Designs and Patents Act 1988

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Malpractice Malpractice is defined as professional misconduct or bad practice. It doesnt necessarily involve breaking the law Example 1 An employee uses his work computer to access pornographic sites and unwittingly downloads malware to the company PC Example 2 An employee leaves her PC logged in while she nips out for a smoking break leaving confidential data on the screen

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Malpractice Penalties for malpractice will usually be covered by an employee code of conduct Example 3 An employee uses his work computer to send offensive s to his work colleagues Example 4 An employee responsible for backup fails to check that backup procedures work. On a system crash it is found that backups are unrecoverable

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Summary/Revision Try these exam style questions 1. Using an ICT related example explain the difference between malpractice and crime 2. Explain, using examples, four different ways in which the Internet is being used to support illegal activities. 3. The use of laptop computers by company employees has increased the threats to ICT systems. Describe four threats to ICT systems caused by employees using laptops. Make your own notes from your textbook and/or Internet sources