Download presentation
Presentation is loading. Please wait.
Published byClifton Hodge Modified over 9 years ago
1
Mrs. Stern Computer Applications II
2
What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking to "strangers" on a computer network.
3
Remember that people online may not be who they seem at first. Who are these people anyway?
4
Never respond to messages or bulletin board items that are: Suggestive of something improper or indecent; Obscene, filthy, or offensive to accepted standards of decency; Belligerent, hostile, combative, very aggressive; and Threaten to do harm or danger towards you or another
5
What should you do?? Tell a grown-up right away Do not give out any sensitive or personal information about you or your family in an Internet "chat room.“ Never arrange a face-to-face meeting without telling your parents or guardians.
6
What is a Hacker?? A hacker is someone who breaks into computers sometimes to read private e-mails and other files.
7
What is your privacy worth? What information about you or your parents do you think should be considered private? medical information a diary your grades how much money your parents owe how much money your family has in a savings account your letters to a friend.
8
How is this invasion of privacy different? Than someone breaking into: your school locker your house to get this information about you and your family?
9
Hackers Destroy "Property" In the Form of Computer Files or Records They delete or alter files.
10
How does it affect drug companies or local pharmacies? What would happen if a hacker altered the chemical formulas for prescription drugs? The flight patterns and other data in air traffic control computers?
11
Hackers Injure Computer Users by Destroying Information Systems
12
Hackers cause victims: To spend time and money checking and resecuring systems after break-in Interrupt service Steal telephone and computer time Share unauthorized access codes and passwords
13
Who do you think pays for this? $2 billion annually in telephone toll fraud alone.
14
Hackers are also responsible for: Crashing computer systems causing them to malfunction and not work
15
Computer “Pirates” Steal Intellectual Property Intellectual property is the physical expression of ideas contained in: Books Music Plays Movies Computer Software
16
What are Copyrights? The legal right of ownership to the work produced in books, music, plays, movies, graphics/pictures and computer software. A copyrighted work cannot be copied without the permission from the owner of the copyright (author, writer or publisher). Originally, copyright meant simply “the right to make copies of a given work.” Black's Law Dictionary (8th ed. 2004)
17
Copyright violations civil and criminal remedies Civil remedy : copyright holder can sue infringer for money to cover loss of sales or other loss caused by infringement. Criminal remedy : jail or fine paid to the government (not copyright holder) where person infringes a copyright for commercial advantage or private gain. For example, a person who makes multiple copies of a video, and sell the copies.
18
How Can We Prevent Computer Crime? Educating Everyone Understand how technology can be used to help or hurt others. what it would be like to be the victim of a computer hacker or computer pirate.
19
How Can We Prevent Computer Crime? (cont) Practicing Safe Computing Who has or may have access to my log-in address? Computer hackers and pirates who hurt others through computer technology They are breaking the law.
20
Please go to the website below: http://www.cybercrime.gov/rules/kidinternet.htm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.