Download presentation
Presentation is loading. Please wait.
Published byHector Horton Modified over 9 years ago
1
Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10
2
Computer Crime and abuse New technology is always a target for crime As ICT has developed, so has computer abuse The internet is widely known to be used by Fraudulent traders Paedophiles Hackers Software pirates Terrorists Computer abuse refers to acts which are legal but unethical
3
Hacking Definition: Unauthorised access to data held on a computer Extent of hacking is difficult to assess Much of it is only discovered by accident Often carried by corrupt employees or employees with a grudge They have insider knowledge of passwords and user IDs At one level, the motive for doing it is just the challenge At any level it is illegal
4
Fraud Much of the hacking that takes place has nothing to do with a fascination for technology It is purely theft Credit card details are stolen by hackers and then used to make fraudulent purchases Card details may also be stolen by more traditional methods and then used to make purchases on the internet
5
Fraud 2 Theft of data: Data can be stolen: by illegally hacking into a computer and downloading data by stealing the actual computer
6
Fraud on the Internet Most of the fraud on the internet is caused by lack of control Anyone can set up a site purporting to be a particular organisation Goods are offered for sale – but never delivered Another type of illicit trade involves the sale of software which – once the buyer pays for it – is apparently available for download The software will either be garbage or not arrive at all
7
Fraud on the Internet 2 You need to be aware of the schemes that are available to try and provide some assurance Sites that you give credit card details on should have SSL – Secure Socket Layer – the URL will start https In the UK, reputable web-sites may have the Which logo on the site.
8
Viruses How a virus works ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk REPRODUCTION - When another floppy disk is inserted into the computer’s disk drive, the virus copies itself on to the floppy disk INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors
9
Logic Bomb Similar to a virus – may be delivered by a virus Can be written to destroy, or even subtly alter the contents of a computer system May require a further signal for activation May require a further signal to prevent activation As in a case of extortion Sometimes, the threat of a bomb having been placed may cause an institution to hand over money Many large organisations would not want the lack of security on their systems exposed
10
Digital Crime and the Law Laws have had to be passed that can have an international impact The EU have discussed a directive for a standard on Internet-related laws Computer Misuse Act of 1990 1.Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent 3.Unauthorised modification of computer material (I.e. programs or data)
11
Software Copyright Laws Covered by Copyright Designs and Patents Act of 1988 Provisions of the Act make it illegal to: Copy software Run pirated software Transmit software over a telecommunications line, thereby, creating a copy software can be illegally copied and distributed
12
Software Copyright Laws 2 In addition, the look and feel of software can be copied In the UK, the Business Software Alliance targeted small and medium sized businesses to ensure that software is correctly licensed FAST – the Federation Against Software Theft is another organisation that is trying to ensure that software developers are not being cheated.
13
Computers against crime Computers are now invaluable in the fight against crime In the 1980s police forces kept information on: Cards Basic computer systems If crimes were committed in different force areas it was difficult to create a combined enquiry Data was not portable
14
Computers against crime 2 The case of the Yorkshire Ripper cause a massive enquiry into the way that investigative evidence was handled The HOLMES system was devised to enable the comparison of information in a more efficient and comprehensive way All manner of systems now exist in the fight against crime One of the latest developments is a system which can capture in ‘real-time’ pictures of people walking in the street and compare them with images held on a database
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.