Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 11 Security and Privacy: Computers and the Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
VIRUSES and DESTRUCTIVE PROGRAMS
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
 a crime committed on a computer network, esp. the Internet.
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses, Hacking and Backups By Katie Louise Bieber!
Everything you wanted to know about Computer Viruses.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
All you need to know to keep you and your computer safe!!!
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer crimes.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Viruses & Destructive Programs
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Malicious Program and Protection
Presentation transcript:

business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh

CRIME & SECURITY Lecture 3.1

Computer Crimes – Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes.

Computer Crimes Hacking: – The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. – The most common technique used technique used by hackers is scanning. Hackers have created tools that scan computers for weak spots. It can be an operating system that hasn't been upgraded or a port in the computer that it is open without the knowledge of the user. – Hackers use this "open window" to get inside your computer in order to do whatever they want to do. – The interesting thing about this is that these hacker tools are available for free in the Internet. So, with a couple of hours of instructions, almost every computer user can become a hacker.

Computer Crimes Computer Viruses – Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users. – Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data.

Computer Crimes Identity Theft: – This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Cyber-stalking – The use of communication technology, mainly the Internet, to torture other individuals is known as cyber-stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber-stalking activities.

Computer Crimes Credit Card Fraud – According to a Gartner survey of 100 retailers, credit card fraud is the No. 1 problem in e- commerce. Ninety-three percent of purchases that are made online use credit cards as a form of payment. Credit card fraud happens when others use someone else's credit card to make purchases online. Credit card numbers can be stolen with false online forms or s.

Computer Virus Computer virus is a computer program that is written intentionally to negatively affects the working of a computer system by altering computer’s data or information without the knowledge or permission of actual user. The virus is having the ability to replicate itself, thus continuing to spread.

Types of Viruses Resident Viruses – This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Polymorphic Virus – This type of virus modifies itself each time it affects other program or file. It is most difficult virus to detect by an antivirus.

Types of Viruses Overwrite Viruses / Stealth Virus – Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. The only way to clean a file infected by an overwrite virus is to delete the file completely. Boot Virus – This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

Types of Viruses Macro Virus – Macro viruses infect files that are created using certain applications or programs that contain macros. File Infectors – This type of virus infects programs or executable files. When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category.

Types of Viruses Companion Viruses – They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run or act immediately by making copies of themselves. FAT Virus – This type of virus attack can be especially dangerous, they attack on FAT by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Types of Viruses Worms – A Worm is a program that copies itself repeatedly in memory or hard disk until no memory space remains. Ultimately computer stops working and needs restart again & again. Trojan Horse – Trojan horse is a virus program that hide itself with common computer files like zip file. Whenever the infected files are opened the virus activates. Logic Bombs – They are not considered as viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

How to protect your computer? Always install Antivirus Software Regular update Antivirus software Regular update your operating system Do not use pirated software Always scan floppy, flash drive before using with the computer

Security Fire Walls – A network fire wall is a computer that protects computer networks from intrusion by serving as a safe transfer point for access to and from other networks. The fire wall computer screens external connections and requests to make sure that they are valid and compatible with the network. Irregular or unauthorized access requests are denied. Hence, fire walls serve as ‘gatekeepers’; keeping the system safe from intrusion.

Security Encryption – Is an important way to protect data that is transmitted via the Internet, intranets, or extranets. The contents of files can be scrambled using special mathematical algorithms. Users must have access to passwords that engage the scrambling and descrambling processing.

Security Monitor – While there is considerable debate about the violation of employee privacy, it is also true that is one of the favorite avenues of attack by hackers for spreading viruses or breaking into networked computers. Moreover, companies often have an interest in preventing illegal, personal, or damaging messages by employees. Companies should establish a clear monitoring policy that communicates to employees the reasons for monitoring, the appropriate use of , and disciplinary actions that can be taken in the case of violations.

Security Backup Files – Duplicate or back up files are an important security measure. Files can also be protected by file retention measures that involve storing copies from previous periods. These can be used to reconstruct current files. Such files may be stored off-premises and can be a key component in disaster recovery.