Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Unethical use of Computers and Networks
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Robert Crawford, MBA West Middle School.  Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Technology Competency Computer Infestations Mr. Locke.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Cybersecurity Test Review Introduction to Digital Technology.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
IT Security  .
COMPUTER VIRUSES Computer Technology.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
VIRUSES and DESTRUCTIVE PROGRAMS
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Computer Security.
Securing your system, protecting your digital data and devices.
Presentation transcript:

Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates state or federal laws and involves using a computer. The term cybercrime often refers specifically to crimes carried out by means of the Internet. Due to computer crime, businesses lose money in the following ways: staff time, downtime, and bad publicity

Computer Crime cont. Even if intruders steal nothing from a business, they still cost companies money. Staff must make the network secure again and consider how to stop security breaches. Security breaches also cost a company in terms of downtime, or a temporary stop to work. System administrators sometimes shut a network down to prevent the loss of data. While the system is down, workers cannot do their jobs. A company can lose business if customers are affected by downtime.

Computer Crime cont. Many companies refuse to announce that a computer crime has been committed against them. If customers learn that someone has stolen their personal information from a company’s network, they may decide that the company is not able to keep such information safe. This can cause customers to stop doing business with the company.

Computer Crime cont. There are many different kinds of computer crime. Some of them require criminals to have a deep knowledge of programming. A virus is a program that performs one or more tasks that the user doesn’t expect. Some viruses are designed to do real harm, such as delete files, slow down network traffic, disable programs, or allow an unauthorized person to access the victim’s computer. Most viruses are designed to hide themselves, avoiding detection by the victim for as long as possible.

Computer Crime cont. If a virus is copied to your computer, the machine is said to be “infected.” A virus can infect your computer in a number of ways. ▫You might receive an infected disk from a friend. ▫You might download an infected file from a Web site. ▫You might receive it attached to an message. Most viruses can affect only the operating system in which they were written, but they can spread from one computer to another.

Computer Crime cont. A macro virus takes advantage of the macro languages in application programs, such as word processors or spreadsheets. Macro viruses launch themselves when an infected file is opened. These viruses are different from normal viruses because they can work on different operating systems.

Computer Crime cont. The most common computer viruses work by hiding inside another program. When you run the program, the virus activates and does its work. A worm is a type of virus that doesn’t need to be hidden inside another program. However, they are hidden inside document files in the form of macros. In most cases, a worm’s job is to replicate itself as much as possible, consuming the victim’s disks and memory. Worms often spread by traveling through network connections. Many viruses are actually worms. They distribute themselves by creating messages and mailing themselves to other computers.

Computer Crime cont. A Trojan horse is a program that does something useful but at the same time, hidden from view, does something destructive. It can damage the system it enters, including erasing all the data on a hard drive. A Trojan horse might come in the form of a simple game. When the victim plays the game, the program does something else in the background, such as opening a port on the computer. Someone can then use this port to access the computer through the Internet.

Computer Crime cont. Some computer crimes have nothing to do with programming. Criminals use a computer to commit theft. Internet advertisements and messages might claim that you can make huge sums of money with very little effort. All you have to do is send money to receive full instructions. This is a scam—just a trick to get your money.

Computer Crime cont. Another type of cybercrime is fraud. When someone steals your personal information, her or she can impersonate you and make credit card purchases in your name or access your bank accounts. This leaves you with bills and a damaged credit rating.

Computer Crime cont. The vast majority of computer thefts occur “on the inside” (by employees), leaving no signs of forced entry. The hardest crime to detect is memory shaving. In this act, a thief steals some of a computer’s memory chips but leaves enough so the computer will start. The crime might go unnoticed for days or weeks. Some Web servers are not properly secured. As a result, intruders can vandalize a Web site by placing prank material on it.

Computer Crime cont. One kind of computer crime is very wide-spread. It is called software piracy, the illegal copying of computer programs. One business group estimates that about one third of all software in use is pirated. Most programs that people buy are licensed only to the purchaser. It is illegal to accept a copy of software from someone else or for you to copy a program and give it to a friend. Software piracy causes software publishers to lose money.

Cybercrime Techniques Many cybercrimes are based on the ability of people to tap illegally into computer networks. Some intruders develop programs that try many different passwords until one works. This is called scanning, or probing. Networks can be blocked from scanners by limiting the number of failed attempts to log onto the system. After three password failures, the network can refuse access. This limits scanners’ chances to determine a valid password.

Cybercrime Techniques cont. A program called a superzapper allows authorized users to access a network in an emergency situation by skipping security measures. In the hands of an intruder, a superzapper opens the possibility of damage to the system. Some intruders spoof, or use a false Internet Protocol (IP) or address to gain access. Intruders assume the IP address of a trusted source to enter a secure network. Using that address, they send e- mails that have destructive attachments, such as viruses. The recipient opens the attachments, letting the virus damage the system.

Cybercrime Techniques cont. A time bomb is a program that sits on a system until a certain event or set of circumstances activates the program. Some employees may create a trap door, or a secret way into the system. Once they quit working for an employer, they can use this to access the system and damage it. Not all trap doors are viruses, but some viruses are trap doors. Many Trojan horse programs, act as trap doors.

Cybercrime Techniques cont. Law enforcement officials are using technology to catch cybercriminals. Several groups have taken part in this effort: ▫Computer Crime and Intellectual Property Section (CCIPS)-The Department of Justice created a special group known as CCIPS to advise and train federal prosecutors and local law enforcement on cybercrime. They review and propose new laws. They coordinate international efforts to combat computer crime and prosecute offenders.

Cybercrime Techniques cont. ▫Computer Hacking and Intellectual Property Project (CHIP)-In the CHIP project, law enforcement officials and prosecutors work closely together to pursue cybercrime. CHIP offices are in areas with a heavy concentration of computer companies. ▫National Infrastructure Protection Center (NIPC)-In 1998, government officials became worried about terrorist attacks on U.S. computer systems. Staffed by people from intelligence agencies and private companies such as Internet service providers, the NIPC ensures that the nation’s computer system could continue to operate in the case of an attack.