Presentation is loading. Please wait.

Presentation is loading. Please wait.

Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Similar presentations


Presentation on theme: "Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10."— Presentation transcript:

1 Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10

2 Computer Crime and abuse  New technology is always a target for crime  As ICT has developed, so has computer abuse  The internet is widely known to be used by Fraudulent traders Paedophiles Hackers Software pirates Terrorists  Computer abuse refers to acts which are legal but unethical

3 Hacking  Definition: Unauthorised access to data held on a computer  Extent of hacking is difficult to assess  Much of it is only discovered by accident  Often carried by corrupt employees or employees with a grudge They have insider knowledge of passwords and user IDs  At one level, the motive for doing it is just the challenge  At any level it is illegal

4 Fraud  Much of the hacking that takes place has nothing to do with a fascination for technology  It is purely theft  Credit card details are stolen by hackers and then used to make fraudulent purchases  Card details may also be stolen by more traditional methods and then used to make purchases on the internet

5 Fraud 2  Theft of data: Data can be stolen: by illegally hacking into a computer and downloading data by stealing the actual computer

6 Fraud on the Internet  Most of the fraud on the internet is caused by lack of control  Anyone can set up a site purporting to be a particular organisation  Goods are offered for sale – but never delivered  Another type of illicit trade involves the sale of software which – once the buyer pays for it – is apparently available for download The software will either be garbage or not arrive at all

7 Fraud on the Internet 2  You need to be aware of the schemes that are available to try and provide some assurance Sites that you give credit card details on should have SSL – Secure Socket Layer – the URL will start https In the UK, reputable web-sites may have the Which logo on the site.

8 Viruses  How a virus works  ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself  TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk  REPRODUCTION - When another floppy disk is inserted into the computer’s disk drive, the virus copies itself on to the floppy disk  INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors

9 Logic Bomb  Similar to a virus – may be delivered by a virus  Can be written to destroy, or even subtly alter the contents of a computer system  May require a further signal for activation  May require a further signal to prevent activation As in a case of extortion  Sometimes, the threat of a bomb having been placed may cause an institution to hand over money  Many large organisations would not want the lack of security on their systems exposed

10 Digital Crime and the Law  Laws have had to be passed that can have an international impact  The EU have discussed a directive for a standard on Internet-related laws  Computer Misuse Act of 1990 1.Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent 3.Unauthorised modification of computer material (I.e. programs or data)

11 Software Copyright Laws  Covered by Copyright Designs and Patents Act of 1988  Provisions of the Act make it illegal to: Copy software Run pirated software Transmit software over a telecommunications line, thereby, creating a copy  software can be illegally copied and distributed

12 Software Copyright Laws 2  In addition, the look and feel of software can be copied  In the UK, the Business Software Alliance targeted small and medium sized businesses to ensure that software is correctly licensed  FAST – the Federation Against Software Theft is another organisation that is trying to ensure that software developers are not being cheated.

13 Computers against crime  Computers are now invaluable in the fight against crime  In the 1980s police forces kept information on: Cards Basic computer systems  If crimes were committed in different force areas it was difficult to create a combined enquiry Data was not portable

14 Computers against crime 2  The case of the Yorkshire Ripper cause a massive enquiry into the way that investigative evidence was handled  The HOLMES system was devised to enable the comparison of information in a more efficient and comprehensive way  All manner of systems now exist in the fight against crime One of the latest developments is a system which can capture in ‘real-time’ pictures of people walking in the street and compare them with images held on a database


Download ppt "Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10."

Similar presentations


Ads by Google