Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.
-
Upload
hector-horton -
Category
Documents
-
view
218 -
download
0
Transcript of Crime & Malpractice AS Module 1 10.8 Heathcote Ch. 10.
Crime & Malpractice
AS Module 1 10.8 Heathcote Ch. 10
Computer Crime and abuse New technology is always a target for crime
As ICT has developed, so has computer abuse
The internet is widely known to be used by• Fraudulent traders• Paedophiles• Hackers• Software pirates• Terrorists
Computer abuse refers to acts which are legal but unethical
Hacking Definition:
• Unauthorised access to data held on a computer
Extent of hacking is difficult to assess
Much of it is only discovered by accident
Often carried by corrupt employees or employees with a grudge• They have insider knowledge of passwords and user IDs
At one level, the motive for doing it is just the challenge
At any level it is illegal
Fraud Much of the hacking that takes place has nothing to
do with a fascination for technology
It is purely theft
Credit card details are stolen by hackers and then used to make fraudulent purchases
Card details may also be stolen by more traditional methods and then used to make purchases on the internet
Fraud 2
Theft of data:
• Data can be stolen:
• by illegally hacking into a computer and downloading data
• by stealing the actual computer
Fraud on the Internet Most of the fraud on the internet is caused by lack of
control
Anyone can set up a site purporting to be a particular organisation
Goods are offered for sale – but never delivered
Another type of illicit trade involves the sale of software which – once the buyer pays for it – is apparently available for download• The software will either be garbage or not arrive at all
Fraud on the Internet 2
You need to be aware of the schemes that are available to try and provide some assurance
• Sites that you give credit card details on should have SSL – Secure Socket Layer – the URL will start https
• In the UK, reputable web-sites may have the Which logo on the site.
Viruses How a virus works
ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself
TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk
REPRODUCTION - When another floppy disk is inserted into the computer’s disk drive, the virus copies itself on to the floppy disk
INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors
Logic Bomb
Similar to a virus – may be delivered by a virus Can be written to destroy, or even subtly alter the
contents of a computer system May require a further signal for activation May require a further signal to prevent activation
• As in a case of extortion
Sometimes, the threat of a bomb having been placed may cause an institution to hand over money
Many large organisations would not want the lack of security on their systems exposed
Digital Crime and the Law
Laws have had to be passed that can have an international impact
The EU have discussed a directive for a standard on Internet-related laws
Computer Misuse Act of 1990
1. Unauthorised access to computer programs or data
2. Unauthorised access with a further criminal intent
3. Unauthorised modification of computer material (I.e. programs or data)
Software Copyright Laws Covered by
• Copyright Designs and Patents Act of 1988
Provisions of the Act make it illegal to:• Copy software• Run pirated software• Transmit software over a telecommunications line, thereby,
creating a copy
software can be illegally copied and distributed
Software Copyright Laws 2
In addition, the look and feel of software can be copied
In the UK, the Business Software Alliance targeted small and medium sized businesses to ensure that software is correctly licensed
FAST – the Federation Against Software Theft is another organisation that is trying to ensure that software developers are not being cheated.
Computers against crime Computers are now invaluable in the fight against
crime
In the 1980s police forces kept information on:• Cards• Basic computer systems
If crimes were committed in different force areas it was difficult to create a combined enquiry• Data was not portable
Computers against crime 2
The case of the Yorkshire Ripper cause a massive enquiry into the way that investigative evidence was handled
The HOLMES system was devised to enable the comparison of information in a more efficient and comprehensive way
All manner of systems now exist in the fight against crime• One of the latest developments is a system which can capture in
‘real-time’ pictures of people walking in the street and compare them with images held on a database