Download presentation
Presentation is loading. Please wait.
Published byAriana Stocke Modified over 10 years ago
1
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Information Systems Malpractice and Crime
2
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Computer Crime Crime is defined as an action that breaks laws passed by Parliament i.e. Crime is illegal Theft of money Theft of data Theft of resources Vandalism Theft of Identity Computer Crime is any criminal act that is committed using ICT Credit card skimming Hacking Zombie computers Viruses/DoS attacks Identity Theft (Duh!)
3
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Money The growth of electronic commerce and the cashless society has led to a growth in theft of money using cloned credit/debit cards Skimming is a process where the details from a genuine cards magnetic strip are copied onto a fake card Card details can be obtained by dishonest employees in shops, bars and restaurants Card details can also by obtained through fake cash machines
4
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Chip and Pin Chip and Pin is an attempt to reduce the growth of credit and debit card fraud Because its so easy to clone the magnetic stripe on a card additional measures are needed Chip and pin cards contain a working chip which is much harder to counterfeit Cloned cards are less use unless a thief knows your pin number (which is why its essential you guard your pin when using an ATM or making a purchase in a store)
5
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Data Data can be the most valuable commodity a business has! Loss of corporate data can lead to: Increased cost for the organisation (to recreate data) Competitive advantage for competitors Hacking is unauthorised access to data held on a computer system. Hacking is an offence under the Computer Misuse Act 1990 Theft can also be physical i.e. the theft of hardware containing data See this BBC article about the possible consequences of laptop theftBBC article
6
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Resources By planting malware on a computer (via email or website) a criminal can take control of it remotely The criminal can then use the Zombie computer to carry out illegal activities including Denial of Service attacks and email spamming. Computer resources (processing power/bandwidth etc) are expensive so cybercriminals will often attempt to take over the PCs of innocent web surfers to carry out their illegal activities Protect yourself by always using a firewall and up-to-date anti virus software
7
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Vandalism Viruses are developed to cause damage to computer files and systems. May overwrite or delete files. Look at this Teach-ICT mini site for a more detailed description of virusesTeach-ICT In a fairly recent development mobile phones are increasingly becoming the target of virus creators
8
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Theft of Identity Identity Theft is on the increase With enough personal details criminals can impersonate you to obtain credit cards, loans and goods in your name i.e. youll be left to pick up the bill! Phishing is a very common method of trying to get you to divulge personal details by email. Personal details can also be obtained from discarded bills and receipts
9
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Other Offences 1 Denial of Service Attack: A web site is flooded with data with the intention of making it crash, preventing legitimate users from gaining access. Considerable financial losses could occur during the time the site is down. Online Fraud: Non existent businesses set up on the Internet to sell non existent goods. If it looks too good to be true it probably is! Pornography & Paedophilia: Posting and downloading of obscene images and news items, the use of newsgroups and chat rooms to illegally entrap vulnerable children.
10
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Other Offences 2 Cyber-stalking: Unwanted persistent e-mail from an unwanted source. Hate sites: Websites run by extremists to promote their views, personal details may be published to endanger the safety of their targets. Includes animal rights, terrorists, racists, etc. Copyright Infringements The growth of the Internet has made it easier to illegally copy and distribute copyright materials such as music, movies and software more easily – in breach of the Copyright, Designs and Patents Act 1988
11
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Malpractice Malpractice is defined as professional misconduct or bad practice. It doesnt necessarily involve breaking the law Example 1 An employee uses his work computer to access pornographic sites and unwittingly downloads malware to the company PC Example 2 An employee leaves her PC logged in while she nips out for a smoking break leaving confidential data on the screen
12
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Malpractice Penalties for malpractice will usually be covered by an employee code of conduct Example 3 An employee uses his work computer to send offensive emails to his work colleagues Example 4 An employee responsible for backup fails to check that backup procedures work. On a system crash it is found that backups are unrecoverable
13
FatMax 2007. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5 License Summary/Revision Try these exam style questions 1. Using an ICT related example explain the difference between malpractice and crime 2. Explain, using examples, four different ways in which the Internet is being used to support illegal activities. 3. The use of laptop computers by company employees has increased the threats to ICT systems. Describe four threats to ICT systems caused by employees using laptops. Make your own notes from your textbook and/or Internet sources
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.