Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 a crime committed on a computer network, esp. the Internet.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer security By Isabelle Cooper.
Computer Skills and Applications Computer Security.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Managing Windows Security
IT Security  .
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
HOW DO I KEEP MY COMPUTER SAFE?
WJEC GCSE Computer Science
G061 - Network Security.
Presentation transcript:

Module 2.2 1

2

 Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes  Categories of computer crime Categories of computer crime  Protecting yourself against cybercrime Protecting yourself against cybercrime  Test and improve your knowledge Test and improve your knowledge 3

Computer crime can be seen in two ways – where a computer system is the target of the crime (e.g. ‘hacking’) and where computer technology is used to enable or commit the crime. 4

Any attempt to manipulate or ‘con’ someone into giving out information such as a password or account number which can be used to impersonate them. Software specifically designed to install itself without the user’s knowledge and to affect or harm a computer system. This includes viruses and spyware. 5

6

It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e ‑ mail. 7

E ‑ mail spoofing is the forgery of an e ‑ mail header so that the e ‑ mail appears to be from a different origin (or person). 8

A computer worm is malware that is able to distribute itself over a network, normally via e ‑ mail, without a person having run an infected program. 9

Written to disrupt the normal functioning of a person’s computer without their knowledge or consent. Used to turn your computer into a ‘bot’ to spread malware or to create security loopholes for other programs to exploit. 10

Tries to monitor and track the way you use your computer. It then sends this information to third parties without your consent or knowledge. 11

Records your keystrokes as you type and can possibly even record the movements of your mouse and take screenshots of what is displayed on your screen. 12

Type of malware which is a destructive program disguised as a useful application. 13

When a computer is ‘hacked’ so that when the user types in a ‘valid’ URL in their browser they are taken to another website, which is often a replica. 14

A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the Internet. 15

Software that downloads onto your computer and bombards your computer with adverts that pop ‑ up whenever you are connected to the Internet. ! ! 16

17

CyberstalkingSpam Uploading unauthorised pictures on the Web Cyberbullying 18

business cyber attacks website cyber attacks cyberterrorism denial of service attacks 19

Bandwidth Identity Processing time and power Money Copyrighted material Data/Intellectual property 20

The criminal either has to: obtain essential information, such as a user name and password, in order to access a secure system get physical access to a computer so that data can be downloaded directly onto portable media. 21

22

Assume nothing Believe no one Check everything AABB CC 23

Anti-virus software Computer programs that scan computer files for viruses and eliminate them. update it regularly 24

Firewall software Software that allows you to control which programs can access the Internet and protects your computer or network from unauthorised access. 25

Anti-spyware software Anti-spyware software detects spyware that has been installed on a computer. update it regularly 26

Be careful when installing ‘free’ software. Have good password policies. Stay informed. 27

Don’t give out personal information. Don’t click on links in pop ‑ ups. Don’t open attachments or programs unless you are sure of what they are. Don’t be gullible. 28

 29

30