Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

14
Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10

Transcript of Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Page 1: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Crime & Malpractice

AS Module 1 10.8 Heathcote Ch. 10

Page 2: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Computer Crime and abuse New technology is always a target for crime

As ICT has developed, so has computer abuse

The internet is widely known to be used by• Fraudulent traders• Paedophiles• Hackers• Software pirates• Terrorists

Computer abuse refers to acts which are legal but unethical

Page 3: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Hacking Definition:

• Unauthorised access to data held on a computer

Extent of hacking is difficult to assess

Much of it is only discovered by accident

Often carried by corrupt employees or employees with a grudge• They have insider knowledge of passwords and user IDs

At one level, the motive for doing it is just the challenge

At any level it is illegal

Page 4: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Fraud Much of the hacking that takes place has nothing to

do with a fascination for technology

It is purely theft

Credit card details are stolen by hackers and then used to make fraudulent purchases

Card details may also be stolen by more traditional methods and then used to make purchases on the internet

Page 5: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Fraud 2

Theft of data:

• Data can be stolen:

• by illegally hacking into a computer and downloading data

• by stealing the actual computer

Page 6: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Fraud on the Internet Most of the fraud on the internet is caused by lack of

control

Anyone can set up a site purporting to be a particular organisation

Goods are offered for sale – but never delivered

Another type of illicit trade involves the sale of software which – once the buyer pays for it – is apparently available for download• The software will either be garbage or not arrive at all

Page 7: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Fraud on the Internet 2

You need to be aware of the schemes that are available to try and provide some assurance

• Sites that you give credit card details on should have SSL – Secure Socket Layer – the URL will start https

• In the UK, reputable web-sites may have the Which logo on the site.

Page 8: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Viruses How a virus works

ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself

TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk

REPRODUCTION - When another floppy disk is inserted into the computer’s disk drive, the virus copies itself on to the floppy disk

INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors

Page 9: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Logic Bomb

Similar to a virus – may be delivered by a virus Can be written to destroy, or even subtly alter the

contents of a computer system May require a further signal for activation May require a further signal to prevent activation

• As in a case of extortion

Sometimes, the threat of a bomb having been placed may cause an institution to hand over money

Many large organisations would not want the lack of security on their systems exposed

Page 10: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Digital Crime and the Law

Laws have had to be passed that can have an international impact

The EU have discussed a directive for a standard on Internet-related laws

Computer Misuse Act of 1990

1. Unauthorised access to computer programs or data

2. Unauthorised access with a further criminal intent

3. Unauthorised modification of computer material (I.e. programs or data)

Page 11: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Software Copyright Laws Covered by

• Copyright Designs and Patents Act of 1988

Provisions of the Act make it illegal to:• Copy software• Run pirated software• Transmit software over a telecommunications line, thereby,

creating a copy

software can be illegally copied and distributed

Page 12: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Software Copyright Laws 2

In addition, the look and feel of software can be copied

In the UK, the Business Software Alliance targeted small and medium sized businesses to ensure that software is correctly licensed

FAST – the Federation Against Software Theft is another organisation that is trying to ensure that software developers are not being cheated.

Page 13: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Computers against crime Computers are now invaluable in the fight against

crime

In the 1980s police forces kept information on:• Cards• Basic computer systems

If crimes were committed in different force areas it was difficult to create a combined enquiry• Data was not portable

Page 14: Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.

Computers against crime 2

The case of the Yorkshire Ripper cause a massive enquiry into the way that investigative evidence was handled

The HOLMES system was devised to enable the comparison of information in a more efficient and comprehensive way

All manner of systems now exist in the fight against crime• One of the latest developments is a system which can capture in

‘real-time’ pictures of people walking in the street and compare them with images held on a database