Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Unit 18 Data Security 1.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
CYBER CRIME AND SECURITY TRENDS
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Viruses & Destructive Programs
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
General Purpose Packages
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Cyber crime & Security Prepared by : Rughani Zarana.
Section 6 Theory Software Copyright, Viruses and Hacking.
Unethical use of Computers and Networks
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Using Information Technology
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Welcome to the ICT Department Unit 3_5 Security Policies.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Legal and ethical issues
Misuses of ICT Malpractice and crime © Folens 2008.
Legislation in ICT.
Unit 6 Digital Literacy Study S3 Obj 2-2
Legislation in ICT.
What is Information Security?
Unit 6 Digital Literacy Study S3 Obj 2-2
Presentation transcript:

Crime & Malpractice AS Module Heathcote Ch. 10

Computer Crime and abuse  New technology is always a target for crime  As ICT has developed, so has computer abuse  The internet is widely known to be used by Fraudulent traders Paedophiles Hackers Software pirates Terrorists  Computer abuse refers to acts which are legal but unethical

Hacking  Definition: Unauthorised access to data held on a computer  Extent of hacking is difficult to assess  Much of it is only discovered by accident  Often carried by corrupt employees or employees with a grudge They have insider knowledge of passwords and user IDs  At one level, the motive for doing it is just the challenge  At any level it is illegal

Fraud  Much of the hacking that takes place has nothing to do with a fascination for technology  It is purely theft  Credit card details are stolen by hackers and then used to make fraudulent purchases  Card details may also be stolen by more traditional methods and then used to make purchases on the internet

Fraud 2  Theft of data: Data can be stolen: by illegally hacking into a computer and downloading data by stealing the actual computer

Fraud on the Internet  Most of the fraud on the internet is caused by lack of control  Anyone can set up a site purporting to be a particular organisation  Goods are offered for sale – but never delivered  Another type of illicit trade involves the sale of software which – once the buyer pays for it – is apparently available for download The software will either be garbage or not arrive at all

Fraud on the Internet 2  You need to be aware of the schemes that are available to try and provide some assurance Sites that you give credit card details on should have SSL – Secure Socket Layer – the URL will start https In the UK, reputable web-sites may have the Which logo on the site.

Viruses  How a virus works  ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself  TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk  REPRODUCTION - When another floppy disk is inserted into the computer’s disk drive, the virus copies itself on to the floppy disk  INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors

Logic Bomb  Similar to a virus – may be delivered by a virus  Can be written to destroy, or even subtly alter the contents of a computer system  May require a further signal for activation  May require a further signal to prevent activation As in a case of extortion  Sometimes, the threat of a bomb having been placed may cause an institution to hand over money  Many large organisations would not want the lack of security on their systems exposed

Digital Crime and the Law  Laws have had to be passed that can have an international impact  The EU have discussed a directive for a standard on Internet-related laws  Computer Misuse Act of Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent 3.Unauthorised modification of computer material (I.e. programs or data)

Software Copyright Laws  Covered by Copyright Designs and Patents Act of 1988  Provisions of the Act make it illegal to: Copy software Run pirated software Transmit software over a telecommunications line, thereby, creating a copy  software can be illegally copied and distributed

Software Copyright Laws 2  In addition, the look and feel of software can be copied  In the UK, the Business Software Alliance targeted small and medium sized businesses to ensure that software is correctly licensed  FAST – the Federation Against Software Theft is another organisation that is trying to ensure that software developers are not being cheated.

Computers against crime  Computers are now invaluable in the fight against crime  In the 1980s police forces kept information on: Cards Basic computer systems  If crimes were committed in different force areas it was difficult to create a combined enquiry Data was not portable

Computers against crime 2  The case of the Yorkshire Ripper cause a massive enquiry into the way that investigative evidence was handled  The HOLMES system was devised to enable the comparison of information in a more efficient and comprehensive way  All manner of systems now exist in the fight against crime One of the latest developments is a system which can capture in ‘real-time’ pictures of people walking in the street and compare them with images held on a database