Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over...
-
Upload
clifton-hodge -
Category
Documents
-
view
212 -
download
0
Transcript of Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over...
![Page 1: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/1.jpg)
Cyber Safety Mrs. Stern
Computer Applications II
![Page 2: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/2.jpg)
What is Computer Crime?
Criminals Can Operate Anonymously Over the Computer Networks.
Be careful about talking to "strangers" on a computer network.
![Page 3: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/3.jpg)
Remember that people online may
not be who they seem at first.
Who are these people anyway?
![Page 4: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/4.jpg)
Never respond to messages or bulletin board items that are:
Suggestive of something improper or indecent;
Obscene, filthy, or offensive to accepted standards of decency;
Belligerent, hostile, combative, very aggressive; and
Threaten to do harm or danger towards you or another
![Page 5: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/5.jpg)
What should you do??Tell a grown-up right away
Do not give out any sensitive or personal information about you or your family in an Internet "chat room.“
Never arrange a face-to-face meeting without telling your parents or guardians.
![Page 6: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/6.jpg)
What is a Hacker??
A hacker is someone who breaks into computers sometimes to read private e-mails and other
files.
![Page 7: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/7.jpg)
What is your privacy worth?
What information about you or your parents do you think should be considered private?
medical information a diary your grades how much money your parents owe how much money your family has in a savings
account your letters to a friend.
![Page 8: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/8.jpg)
How is this invasion of privacy different?
Than someone breaking into: your school locker
your house to get this information about you and your family?
![Page 9: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/9.jpg)
Hackers Destroy "Property"
In the Form of Computer Files or Records
They delete or alter files.
![Page 10: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/10.jpg)
How does it affect drug companies or local pharmacies?
What would happen if a hacker altered the chemical formulas for prescription drugs?
The flight patterns and other data in air traffic control computers?
![Page 11: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/11.jpg)
Hackers Injure Computer Users
by Destroying Information Systems
![Page 12: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/12.jpg)
Hackers cause victims:To spend time and money checking and
resecuring systems after break-in
Interrupt service
Steal telephone and computer time
Share unauthorized access codes and passwords
![Page 13: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/13.jpg)
Who do you think pays for this?
$2 billion annually in telephone toll fraud alone.
![Page 14: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/14.jpg)
Hackers are also responsible for:
Crashing computer systems causing them to malfunction and
not work
![Page 15: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/15.jpg)
Computer “Pirates” Steal Intellectual Property
Intellectual property is the physical expression of ideas contained in:
BooksMusicPlaysMoviesComputer Software
![Page 16: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/16.jpg)
What are Copyrights? The legal right of ownership to the work
produced in books, music, plays, movies, graphics/pictures and computer software.
A copyrighted work cannot be copied without the permission from the owner of the copyright (author, writer or publisher).
Originally, copyright meant simply “the right to make copies of a given work.” Black's Law Dictionary (8th ed. 2004)
![Page 17: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/17.jpg)
Copyright violations civil and criminal remedies
Civil remedy: copyright holder can sue infringer for money to cover loss of sales or other loss caused by infringement.
Criminal remedy: jail or fine paid to the government (not copyright holder) where person infringes a copyright for commercial advantage or private gain. For example, a person who makes multiple copies of a video, and sell the copies.
![Page 18: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/18.jpg)
How Can We Prevent Computer Crime?
Educating EveryoneUnderstand how technology can be used to
help or hurt others.what it would be like to be the victim of a
computer hacker or computer pirate.
![Page 19: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/19.jpg)
How Can We Prevent Computer Crime? (cont)
Practicing Safe Computing
Who has or may have access to my log-in address?
Computer hackers and pirates who hurt others through computer technology
They are breaking the law.
![Page 20: Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.](https://reader036.fdocuments.us/reader036/viewer/2022070409/56649e985503460f94b9aede/html5/thumbnails/20.jpg)
Please go to the website below:http://www.cybercrime.gov/rules/kidinternet.htm