Download presentation
Presentation is loading. Please wait.
Published byStella Marshall Modified over 9 years ago
1
How to combat a range of ICT crimes Fighting Crime
2
This presentation covers: Different methods for combating ICT crime including: – Physical methods – Logical methods
3
Physical Methods A simple computer theft could include stealing someone’s USB pen drive which contains sensitive information on it. Why was sensible information on a USB stick in the first place? Try asking some government officials...they do it all the time...and get in trouble when they leave them on the train!
4
Physical Methods Essentially, using physical security is one easy way of preventing people accessing information they shouldn’t see. Some methods might include: – Locking a computer away and only giving certain people a key to the room. – Making sure your monitor can not be seen by the public. – Covering up the keyboard so people can not see what you are typing. – Using armed mercenaries who each have night vision goggles so that they can see in the dark if the power is cut and who’s minds have been brain washed to feel no pain in the event that they are captured and tortured for the information that people seek... – Or you could use some security cameras and alarm systems...whichever you prefer really.
5
Physical Methods Biometric data is being used more often to help with security...scanning the eye, finger prints, voice recognition...those are all used today. The popularity of wireless networks has thrown up a fair few issues with security too. Data is floating about all around us these days...but securing that data proved difficult with a lock and key...even the mercenaries had difficulty in stopping people accessing data...so some clever clogs decided they needed to be a bit logical to solve the problem!
6
Logical Methods A logical method is any computer-based method that can be used to help secure a system. Usernames and passwords are one example of a logical method.
7
Logical Methods Other methods include using firewalls and encryption. Firewalls act as a gateway between the outside world and a system. It dictates what data gets in and what data is allowed to leave. Its a hardcore barrier that many hackers love to try and get through...
8
Logical Methods Encryption doesn’t stop data being stolen...it aims at confusing the person who tries to read the data. It uses algorithms to scramble plain text into encrypted text. To unscramble the encryption you need to have the ‘key’ to unlock the encryption. Encryptions can be broken...but by using heavy encryptions can mean it takes someone a very long time to break it...by the time they do perhaps the data is no longer relevant!
9
Logical Methods Auditing is also another tool in preventing crimes...well...its more used for detecting crimes quickly. As you use a system you leave a trail of ‘logs’ in your wake – when you logged in, what applications you used...and when you are at work you usually do certain things and certain times. If your account logs in at strange times that doesn’t fit your usual pattern the auditing software might flag this as being suspicious – it could mean someone else has logged in using your account details!
10
What should you do now? Answer the questions in the text book: – Pages 166 to 170. Research the terms Firewall, Auditing and Encryption and write definitions for them. Create your own Cipher and see if someone can break it!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.