How to combat a range of ICT crimes Fighting Crime.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Factors to be taken into account when designing ICT Security Policies
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
Workplace Security for Employees. © Business & Legal Reports, Inc Session Objectives You will be able to: Understand the company’s security policy.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security GCSE ICT.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
General Purpose Packages
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
ESCCO Data Security Training David Dixon September 2014.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Chapter X When can I consider my personal data secure?
©Holm Publications Security Awareness Presentation.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
ICT Homework- ICT Security Consultant PowerPoint.
Diana Bannister MBE Development Director for Learning Technologies School for Education Futures University of Wolverhampton United Kingdom
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Computer security By Isabelle Cooper.
Mysteries A Genre of Literature. What is a mystery? Mysteries are often filled with suspense, but they are also puzzles. Part of the fun of a mystery.
Network Security & Accounting
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Computer Security By Duncan Hall.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Unit 1 Communication and Employability Skills for IT 1.
TOP TIPS FOR MFL SUCCESS… This might all sound obvious, but you would be surprised how many people just read through their textbook when they revise! To.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Challenge/Response Authentication
Security Risks Todays Lesson Security Risks Security Precautions
Lesson Objectives Aims You should be able to:
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
When can I consider my personal data secure?
Handling Information Securely
G061 - Network Security.
Presentation transcript:

How to combat a range of ICT crimes Fighting Crime

This presentation covers: Different methods for combating ICT crime including: – Physical methods – Logical methods

Physical Methods A simple computer theft could include stealing someone’s USB pen drive which contains sensitive information on it. Why was sensible information on a USB stick in the first place? Try asking some government officials...they do it all the time...and get in trouble when they leave them on the train!

Physical Methods Essentially, using physical security is one easy way of preventing people accessing information they shouldn’t see. Some methods might include: – Locking a computer away and only giving certain people a key to the room. – Making sure your monitor can not be seen by the public. – Covering up the keyboard so people can not see what you are typing. – Using armed mercenaries who each have night vision goggles so that they can see in the dark if the power is cut and who’s minds have been brain washed to feel no pain in the event that they are captured and tortured for the information that people seek... – Or you could use some security cameras and alarm systems...whichever you prefer really.

Physical Methods Biometric data is being used more often to help with security...scanning the eye, finger prints, voice recognition...those are all used today. The popularity of wireless networks has thrown up a fair few issues with security too. Data is floating about all around us these days...but securing that data proved difficult with a lock and key...even the mercenaries had difficulty in stopping people accessing data...so some clever clogs decided they needed to be a bit logical to solve the problem!

Logical Methods A logical method is any computer-based method that can be used to help secure a system. Usernames and passwords are one example of a logical method.

Logical Methods Other methods include using firewalls and encryption. Firewalls act as a gateway between the outside world and a system. It dictates what data gets in and what data is allowed to leave. Its a hardcore barrier that many hackers love to try and get through...

Logical Methods Encryption doesn’t stop data being stolen...it aims at confusing the person who tries to read the data. It uses algorithms to scramble plain text into encrypted text. To unscramble the encryption you need to have the ‘key’ to unlock the encryption. Encryptions can be broken...but by using heavy encryptions can mean it takes someone a very long time to break it...by the time they do perhaps the data is no longer relevant!

Logical Methods Auditing is also another tool in preventing crimes...well...its more used for detecting crimes quickly. As you use a system you leave a trail of ‘logs’ in your wake – when you logged in, what applications you used...and when you are at work you usually do certain things and certain times. If your account logs in at strange times that doesn’t fit your usual pattern the auditing software might flag this as being suspicious – it could mean someone else has logged in using your account details!

What should you do now? Answer the questions in the text book: – Pages 166 to 170. Research the terms Firewall, Auditing and Encryption and write definitions for them. Create your own Cipher and see if someone can break it!!