Download presentation
Presentation is loading. Please wait.
Published byGodwin Burns Modified over 9 years ago
1
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design
2
Lesson Objectives Identify types of computer crimes. Identify the “work” of hackers. Identify computer viruses. Describe how privacy is invaded because of computer use. Identify various security measures. Describe software piracy. Identify computer-related laws.
3
Types of Computer Crimes
4
Definition: Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples –Stealing money from bank accounts –Stealing information from other people’s computers Indicators of computer fraud –Low staff morale: unhappy employees who decide the company owes them. –Unusual work patterns. –Employees who appear to be living beyond their income Computer Fraud
5
Computer Hacking Definition: invading someone else’s computer, usually for personal gain or just for the fun of it. Usually computer experts Steal money Change or damage data stored on a computer Causes millions of dollars of damage each year
6
Computer Viruses Definition: a program that has been written, usually by a hacker, to cause corruption of data on a computer. Viruses attach to an executable file Spreads from one file to another once the program is run or used Can cause major damage to a computer’s data Can display messages on the screen
7
Types Computer Viruses
8
Computer Virus: Worm Makes many copies of itself until the computer system slows down or actually stops Worms do not have to attach themselves to other files Example: –Dialer.AxFreeAccess is a dialer program that can phone high cost numbers from the compromised computer.
9
Computer Virus: time bomb Does not cause damage until a certain date or until the system has been booted a certain number of times. Example –BAT.Bomb is a batch script that grows in size, taking up any free space on the hard drive partition on which it resides. This will cause a dramatic slowdown in performance and operating system instability.
10
Computer Virus: logic bomb Triggered by the appearance or disappearance of specified data
11
Computer Virus: trojan horse Does something different from what it is expected to do Example –AOL4Free: This trojan horse first searches for the DOS program DELTREE.EXE in various directories, and then uses DELTREE.EXE to delete all files from your C drive.
12
Ways to protect your computer against virus damage Anti-virus software Scan email attachments before you open them Scan other files copied to diskettes or downloaded from the Internet
13
Other Computer Crimes Theft of time –Committed regularly on a job –An employee uses a company’s computer for personal use Theft of output –Using the information seen on someone’s computer screen Data Diddling –Changing data before or after it is entered into the computer –Usually committed by someone who is entering, recording, encoding, or checking data who has access to documents to change information
14
Computer crimes are difficult to prove and prosecute.
15
Other Computer Issues
16
Privacy Information is being gathered about you as you surf the Internet Companies create databases and sell or trade this information to others The results after being sold causes your name to be added to mailing lists. Lists are used for marketing purposes. Junk e-mail (spam) is used for the same purpose. Credit history is also available to be sold. Information sent by e-mail at work or school can be accessed without your permission.
17
Security Need to keep hardware, software, and data safe from harm or destruction Some risks –Natural –Accidents –Intentional Companies protect data by controlling access –Most common form: passwords –Passwords are changed periodically
18
Other Security Measures Maintain and enforce security measures that are already in place. Electronic identification cards to access certain areas Firewalls (special hardware and software) Anti-virus software Selective hiring process Careful screening of potential employees Regular backing up of data and storing it
19
Other Security Measures Biometric security measures –Hardware and software used to examine a fingerprint, voice pattern, iris or retina of the eye
20
Software Piracy Definition: illegal copying and using software If sued for civil copyright infringement, the penalty is up to $100,000 per title infringed. If charged with a criminal violation, the fine is up to $250,000 per title infringed and up to five years imprisonment.
21
Classifications of Software
22
Commercial Software Commercial Software is generally developed for license to users for a fee. An example of commercial software is MS Word ®, whose licensor is Microsoft Corporation. Companies that develop and distribute commercial software have become increasingly vigilant about guarding their valuable corporate assets (software copyrights) by pursuing unauthorized users.
23
Shareware Different from commercial software in that it can be copied (usually by downloading from the Internet) at no cost for a trial period. However, Shareware is still protected by copyright. After the copy of the software is tested or the free trial period expires, the user must purchase a license for the shareware or delete, uninstall or otherwise destroy the copy of the shareware. The software is still protected by copyright law and is subject to the terms of the licensing agreement.
24
Freeware Software that is protected by copyright but can be copied as either an archival (backup) copy or for use as long as the use is not for profit. Some Freeware can be de-compiled(change it) and modified without the permission of the copyright holder, but generally any new program derived from Freeware must also be designated as Freeware and not sold for profit. It is important to understand that all software that is freely attainable is not Freeware. For example, while Microsoft and Netscape currently distribute respectively Internet Explorer and Navigator browser software for free, neither is Freeware
25
Public Domain Copyrighted software enters the Public Domain when a copyright holder specifically surrenders all rights to the software. This kind of software is not protected by copyright and can be freely copied, modified or de-compiled without license or permission. Any new programs derived from this software are not subjected to limitations or conditions on distribution. All intellectual property works are assumed by law to be copyrighted. Therefore, for software to become public domain software the holder must explicitly designate such software as being public domain. A user's incorrect assumption that certain software was in the public domain will not likely constitute a valid defense against a charge of copyright infringement.
26
Laws for Technology Abuse
27
Copyright Act of 1976 –Protects the developers of software Computer Matching and Privacy Protection Act, 1988 –Regulates how federal data can be used to determine whether an individual is entitled to federal benefits Electronic Communications Privacy Act, 1986 –Prohibits the interception of data communication Computer Fraud and Abuse Act, 1986 –Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communications Software Piracy and Counterfeiting Amendment of 1983 Many states have individual laws governing computer crimes
28
Organizations Against Piracy
29
Software and Information Industry Association Represents software developers of all types and sizes Lobby lawmakers for tougher anti-piracy laws Takes proactive steps to stop pirates. The organizations offer rewards to persons who report pirates or acts of piracy Help businesses perform voluntary software audits Works with law enforcement officials to conduct involuntary audits.
30
Business Software Alliance Promotes global policies that foster innovation, growth and a competitive marketplace for commercial software and related technologies. Strong copyright protections, cyber security and barrier-free trade are crucial to achieving these goals.
31
Summary Computer crime has become a major problem, costing companies billions of dollars annually. Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit. Computer hacking involves invading someone else’s computer for personal gain. Sometimes it is done for financial gain and sometimes just as a prank. A computer virus is a program that has been written to cause corruption of data on a computer. There are different variations of viruses. These include worms, time bombs, logic bombs, and trojan horses. To protect yourself against viruses, install and keep an antivirus program running on your computer. Be sure to update it regularly.
32
Summary (cont’d) E-mail attachments can contain viruses. It is a good idea to save any message to disk if you are not familiar with the sender. After saving it to a disk, you can scan it for viruses. Personal privacy has been invaded by the computer. Information about our personal lives is freely available. Other computer crimes include theft of computer time, data diddling, and using information from another person’s screen or printouts Companies purchase personal information obtained on the Internet to sell to various companies for marketing purposes. Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data is to control access to the data. The most common way to control access to data is to use passwords. Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.