Security, Privacy, and Ethics Online Computer Crimes.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Unit 18 Data Security 1.
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Computer Viruses.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Data Security GCSE ICT.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crimes.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Digital Citizenship Project By Allen Naylor Ed 505.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Crimes Career & Technology Education Department.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Basics Technology’s Impact.
Protect Your Computer Against Harmful Attacks!
Computer Viruses.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Ethical Use of Computers
Presentation transcript:

Security, Privacy, and Ethics Online Computer Crimes

Objective  Given instructions, the learner will discuss the network and web security with 85% accuracy.

Computer Crimes It is a criminal act committed through the use of a computer.

Types of Computer Crimes Unauthorized use of a computer Infection of a computer by a malicious program (a virus) Harassment and stalking on the computer Theft of computer equipment Copyright violations of a software Copyright violations of information found on the internet (Sharing Copyright Music or MP3s)

Computer Fraud Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples of computer fraud include stealing money from bank accounts and stealing information from other people’s computer for gain.

Signs of Computer Fraud Low staff moral: Unhappy staff members may decide the company owes them. Unusual work patterns. Staff members who appear to be living beyond their income.

Computer Hacking It involves invading someone else’s computer. Usually for personal gain or just the satisfaction of invading someone else’s computer. Hackers are usually computer experts who enjoy having the power to invade someone else’s privacy. They can steal money, or change or damage data stored on a computer

Computer Virus A program that has been written usually by a hacker, to cause corruption of data on a computer. The virus is attached to an executable file (like a program file) and spreads from one file to another once the program to executed

Types of Virus Worm Time Bomb Logic Bomb Trojan Horse

Worm A worm makes copies of itself, resulting in the consumption of system resources that slows down or actually halts task. Worms don’t know to attach themselves to other files.

Time Bomb A time bomb is virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

Logic Bomb A logic bomb is a virus triggered by the appearance or disappearance of specified data.

Trojan Horse A Trojan horse is a virus that does something different from what that is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous)

Protect Your Computer From Viruses Use antivirus software. This software should always run on your computer and should be updated regularly. Be careful in opening attachments. It is a good idea to save them to disk before reading them so you can scan them. Don’t access files copied from floppy disks or downloaded from the Internet without scanning them first.

Software Piracy The illegal copying or use of computer programs. Software Programs come with a license number or key that are used to install the program correctly to register it with the company online before you can use the program. FREEWARE Software that is offered online at no cost is call FREEWARE. SHAREWARE SHAREWARE is also available on the internet at no cost to use for a trial period, but then the developer expects to be paid a fee for the software, which may have taken many hours of programming to develop.

Other Computer Crimes Theft of Computer Time Theft of Computer Time – This crime is committed when an employee uses a company’s computer for personal use such as running a small side business, keeping personal records. Theft of output Theft of output – Using information you see on someone’s else’s screen or printout to profit unfairly. – Data Diddling – Data Diddling is changing data before it is entered into the computer or after it has been entered into the computer

Post – Qs? What is Computer Crimes? – It is a criminal act committed through the use of a computer. What is Computer Fraud? – Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Name one sign of computer fraud in a company. – Low staff moral, Unusual work patterns, and living beyond their income What is a Hacker? – It involves invading someone else’s computer. What is a Computer Virus? – A program that has been written usually by a hacker, to cause corruption of data on a computer. Name four types of Virus. – Worm, Time bomb, Logic bomb, Trojan horse Name one other computer crime. – Theft of Computer time and Theft of output

SECURITY ISSUES Computer Security

Objective Given instructions, the learner will discuss the network and web security with 85% accuracy.

Computer Security Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data it to effectively control the access to it. Passwords The most common form of restricting access to data is the use of Passwords (Password are used to protect data against unauthorized users).

Other Security Measures Electronic identification cards are used to gain access to certain areas within a building or department. Firewalls, which consist of special hardware a software, protect individual companies’ network form external networks. Antivirus software are used to protect data on your computer.

Other Security Measures for Companies Institute a very selective hiring process that includes careful screening of potential employee. Regularly back up data and store it offsite. Biometrical Security Measures Employ Biometrical Security Measures, which examine a fingerprint, a voice pattern, or the iris or retina of the eye.

Cookies Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. It makes it easier for you to use the website when you return and it also provides the Web owner with information.

Spyware A program installed on your computer without your knowledge, usually when you download a file. Spyware tracks your Web habits and take control over your computer and direct you to websites. Spyware can be harmful as well as annoying; firewalls consisting of hardware and software features can protect your computer from unauthorized spyware programs.

Piracy Piracy is a theft of intellectual property.

Laws that Protects Users The Copyright Act of 1976: The Copyright Act of 1976: Protects the developer of software. Software Piracy and Counterfeiting Amendment Software Piracy and Counterfeiting Amendment Electronic Communication Piracy Act, 1986: Electronic Communication Piracy Act, 1986: Prohibits the interception of data communication Computer Fraud and Abuse Act, 1986: Computer Fraud and Abuse Act, 1986: Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communication. Computer Matching & Privacy Protection Act, 1988: Computer Matching & Privacy Protection Act, 1988: Regulates how federal data can be used to determine whether an individual is entitled to federal benefits. Many states also have laws governing computer crimes.

The Golden Rule “Do unto other’s as you would have them do unto you!”

Post – Qs? Why is computer security necessary? – Computer security is necessary in order to keep hardware, software, and data safe form harm or destruction? Name a law that has been passed to protect your computer? – 1) Copyright Act of 1976, 2) Software Piracy and Counterfeiting Amendment of 1983, 3) Electronic Commission Privacy Act, 1986, 4) Computer Fraud and Abuse Act, 1986, and 5) Computer Matching & Privacy Protection Act, 1988 What is cookies? – Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. What is Piracy? – Piracy is a theft of intellectual property. What is spyware? – A program installed on your computer without your knowledge, usually when you download a file.