Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Chapter 9: Privacy, Crime, and Security
Unit 18 Data Security 1.
Prepared by: Nahed Al-Salah
Computer Viruses.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
Slides created by Bob Koziel Hagerstown Community College.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Viruses & Destructive Programs
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Cyber Crimes.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Computers Are Your Future
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
 a crime committed on a computer network, esp. the Internet.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Computer crimes.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
CSCI-235 Micro-Computer Applications Privacy & Security I.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Computer Security.
Computer Security.
Presentation transcript:

Computer Crimes 8 8 Chapter

The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time on company computers o Breaking into government Web sites o Stealing credit card information Definition:

Stealing or compromising data. Gaining unauthorized computer access. Violating data belonging to banks. Intercepting communications. Threatening to damage computer systems. Disseminating (spread) viruses. Federal and State Laws:

Who commits computer crime?

Computer crimes occur when intruders gain unauthorized access to computer systems. Cybercrime is crime carried out over the Internet. Cyber law tracks and combats computer related crime. Types of Computer Crime- 1. Identity Theft 2. Computer Viruses 3. Fraud and Theft 4. More Rogue Program 5. Forgery 6. Blackmail Computer crime and cybercrime

Intimidate (threaten) governments to advance political or social objectives Launch computer-based attacks Seek to cause harm o Rather than gather information Many experts believe terrorist groups pose only a limited threat to information systems Cyber terrorists

Types of computer crime … 1.Identity theft Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. 2.Computer viruses are malicious programs that infect a computer system causing various problems with its use. a destructive program that disrupts the normal functioning of computer systems. viruses replicate and attach themselves to programs in the system.

How virus infections spread? o Inserting a disk with an infected program and then starting the program. o Downloading an infected program from the Internet. o Being on a network with an infected computer. o Opening an infected attachment. Dr. Mohammad Alamgeer ( Types of computer crime …

Type of viruses: i.File Infectors o Attach themselves to program files. o Spread to other programs on the hard drive. o Are the most common type of virus. ii.Boot Sector Viruses o Attach themselves to the boot sector of a hard drive. o Execute each time the computer is started. o May lead to the destruction of all data. Dr. Mohammad Alamgeer ( Types of computer crime …

iii.Macro viruses o Infect the automatic command capabilities of productivity software. o Attach themselves to the data files in word processing, spreadsheet, and database programs. o Spread when the data files are exchanged between users. Dr. Mohammad Alamgeer ( Types of computer crime …

Dr. Mohammad Alamgeer ( Types of computer crime …

3.More Rogue Programs i.Time Bombs Also called logic bombs A type of Trojan horse that stays dormant (un-active) for a period of time before activating. Harmless until a certain event or circumstance activates the program. ii.Worms Resemble a virus and usually does not destroy files. Spread from one computer to another. Control infected computers. Attack other networked computers. Dr. Mohammad Alamgeer ( Types of computer crime …

iii.Denial of Service Attack (DoS) Synchronize flooding. Overload an Internet server with a large number of requests. iv.Trojan Horses Disguise themselves as useful programs. Activates without being detected; does not copy itself. Contain hidden instructions. May erase data or cause other damage. Dr. Mohammad Alamgeer ( Types of computer crime …

4.Fraud and Theft Selling social security numbers. Memory shaving – taking RAM chips from computers. Salami Shaving  Programmer alters a program to take a small amount of money out of an account Dr. Mohammad Alamgeer ( Types of computer crime …

5.Forgery  Internet data can appear to be coming from one source when its really coming from another.  Forged and Web pages. 6.Blackmail  Adverse publicity fears. Dr. Mohammad Alamgeer ( Types of computer crime …

1.Hackers  One who gains unauthorized computer access, but without doing damage.  Gain unauthorized access to computer or telecommunications systems  Computer hobbyists  Find weaknesses and loopholes in computer systems Dr. Mohammad Alamgeer ( Computer criminals:

2.Crackers  One who breaks into computer systems for the purpose of doing damage.  Illegally break into computers for malicious purposes.  Also called black hats.  Obsessed with entering secure computer systems.  Leave calling cards on the systems they enter. Dr. Mohammad Alamgeer ( Computer criminals …

3.Cyber Gangs  Bring crackers together by way of the Internet and meetings. 4.Virus Authors  Push the boundaries of antivirus software.  Create viruses that are very damaging. Dr. Mohammad Alamgeer ( Computer criminals …

5.Employees  Sabotage their company’s computer system  Create security holes called trap doors 5.Swindlers  Use the Internet to scam money from people  Use scams like rip and tear, pumping and dumping, and bogus goods Dr. Mohammad Alamgeer ( Computer criminals …