Assignment 5 What is Internet Crime?

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

How to protect yourself, your computer, and others on the internet
Introduction and Overview of Digital Crime and Digital Terrorism
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
JCSD-aw Citizenship in an e-World Johnston Community School District.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 1 Introduction to Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Unethical use of Computers and Networks
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Crime & Malpractice AS Module Heathcote Ch. 10.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cassidy Culligan Digital Citizenship Project ED 505.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Chap1: Is there a Security Problem in Computing?.
Internet crime By: Brandon Murphy & Cameron Martin.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer crimes.
Computer Security By Duncan Hall.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Video: Digital citizenship is defined as the norms of appropriate,
Societal Issues in Computing (COMP466)
What is Computer Crime? Identity Theft Cyber-Bulling Hacking
Information Systems for Health:
Presentation transcript:

Assignment 5 What is Internet Crime? Computer crime refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3] Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".[4] Such crimes may threaten a nation’s security and financial health.[5] Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. An Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26. http://en.wikipedia.org/wiki/Computer_crime

2. What is telecommunication crime Telecommunications access device" means an instrument, device, card, plate, code, account number, personal identification number, electronic serial number, mobile identification number, counterfeit number, or financial transaction device that alone or with another telecommunications access device can acquire, intercept, provide, receive, use, or otherwise facilitate the use of a telecommunications device, counterfeit telecommunications device, or telecommunications service. http://www.statutes.legis.state.tx.us/Docs/PE/htm/PE.33A.htm

3. What are the main types of computer and telecommunication crime? 1. Pediphile 2. illegal downloader 3. hacker 4. identity thief 5. spammer. http://answers.yahoo.com/question/index?qid=1006032206649

4. What does the term "computer hacker" mean? Find a famous hacker! There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyberworld by breaking into secure networks and messing things up. Second, you’ve got the kind of people who just enjoy fiddling around with software source code and hardware gigs. 1. Jonathan James Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system.[4] What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in Dulles, Virginia, which he used to install a sniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers.[http://en.wikipedia.org/wiki/Jonathan_James

5. What are some recent news items about Internet Crime? Feds Seize Websites Hawking Knockoffs (Newser) – If you've been looking for bargains online the last few days, you may have come across a message instead from your friendly Homeland Security Department: "This website has been seized ..." The feds have been shutting down dozens of sites that appeared to be selling knockoffs of items such as NFL jerseys or designer handbags, reports TorrentFreak, which has a lengthy list of seized domains. Authorities also shut down torrent sites that helped people download copyrighted music, notes Business Insider. (Why a matter of homeland security? The crackdown comes from the DHS' Immigration and Customs Enforcement division, which has sway in matters of counterfeit goods and intellectual property.) http://www.newser.com/tag/24728/1/internet-crime.html

6. What is the RCMP doing to enforce the law regarding computer crime in Canada Protect Yourself! Here are three basic precautions you should take in order to surf the Net in a more secure manner: 1. Make regular updates of your computer system (software, operating system, etc.). 2. Get a good anti-virus software and update it regularly. 3. Get a good firewall and update it regularly. http://www.rcmp-grc.gc.ca/qc/pub/cybercrime/cybercrime-eng.htm

7. The Criminal Code of Canada and the Copyright Act contain provisions that deal with computer and telecommunication crime.  Explain.   1. Criminal Law Amendment Act, 1985 Criminal Code amendments dealing with computer crime came into effect on 4 December 1985. The various legislative provisions are substantially in keeping with the recommendations of the Sub-committee on Computer Crime. On the one hand, unauthorized use of a computer is proscribed by section 342.1: Everyone who, fraudulently and without colour of right, (a) obtains, directly or indirectly, any computer service, (b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system, or (c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system. 2. An Act to Amend the Copyright Act, S.C. 1988, c. 15 Also in keeping with the recommendations of the Sub-committee were additional steps taken to address the issue of unauthorized appropriation of software materials. As a result of 1988 amendments to the Copyright Act, "computer program" is now defined and included in the definition of "literary works" protected under the Act. In addition to the civil remedies available for infringement of copyright, the Act makes such infringement an offence punishable on summary conviction or indictment. Additional 1988 amendments increased the penalties for that offence to a maximum of $1,000,000 and/or five years’ imprisonment for conviction on indictment. http://publications.gc.ca/Collection-R/LoPBdP/BP/bp87-e.htm

8. Why do people feel that this type of activity (burning CD's, hacking into other peoples computers etc.) is not a crime? 1. Because wanted a copy for themseleves or for friends 2. Another reason is they don’t know the victim or the company.

9. What are some common methods to commit computer related crime? Major crime is hacking. People like terrorists might try to hack government database and steal files and security information. They plan their program by using the faults they find. Hackers are generally computer experts but they can't be Physical experts to run away from cops. The punishment is severe and they will be prosecuted to the core. If its proved that they are terrorists, they may be put to death Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses. http://answers.yahoo.com/question/index?qid=20071005073054AAcOhAj

10. Why is it important that we become more aware of computer crime? So many of us now not just work online but live part of our lives online. Exchanging messages, pictures, memories through social media. Skyping or FaceTiming friends and family from thousands of miles away. Watching television or listening to radio from virtually any part of the globe. Our economy is increasingly going digital. Nearly two thirds of us manage our finances online. We do more of our shopping online than ever. Annual online retail sales topped £2.6 billion last year with year on year growth of 30%. One study suggests that the UK’s internet economy is now worth £82 billion a year and rising. And Government itself is increasingly adopting new technology for the delivery of services. Under the Digital by Default strategy, Government is moving more and more of its service provision online. It’s a global change and a global challenge. Over a third of the world’s population has internet access and by the end of this decade the number of networked devices could outnumber people by six to one. This digital revolution continues to offer huge opportunities for growth in our economy, our culture, our well-being. It is imperative for the future of the UK that we harness these opportunities. But if we are to benefit from the huge potential upside of the online economy we have to confront the growing digital dangers that could put this at risk. And this is one of the biggest challenges we face as a country. We are facing a growing and ever more complex threat. But our response to it has grown too. And our ambition is to go further. The internet should be a source of tremendous economic and cultural growth for the UK. Cyber security should be an important part of that growth.

11. What are some steps we can use to establish and maintain an adequate computer security? Securing your computer is essential to protecting your privacy, reducing the risk of identity theft, and preventing hackers from taking over your computer. Unfortunately, maintaining the security of your computer can be challenging. Hackers often seem to be one step ahead of even those computer users who are following the best security practices. Maintaining your privacy requires you to take a multi-pronged approach. It involves protecting your sensitive information by preventing, detecting, and responding to a wide variety of attacks. There are many potential risks to your computer. Some are more serious than others. Among these dangers are: · Viruses corrupting your entire system · Someone breaking into your system and altering files · A hacker using your computer to attack others · Someone stealing your computer and accessing your personal information There's no guarantee that even with the best precautions some of these things won't happen. However, you can take steps to minimize the risks to your computer and your sensitive information. Ultimately, the security of your computer is dependent upon you. https://www.privacyrights.org/fs/fs36-securing-computer-privacy.htm

Used Wikipedia