Security, Privacy, and Ethics Online Computer Crimes.

28
Security, Privacy, and Ethics Online Computer Crimes

Transcript of Security, Privacy, and Ethics Online Computer Crimes.

  • Slide 1
  • Slide 2
  • Security, Privacy, and Ethics Online Computer Crimes
  • Slide 3
  • Objective Given instructions, the learner will discuss the network and web security with 85% accuracy.
  • Slide 4
  • Computer Crimes It is a criminal act committed through the use of a computer.
  • Slide 5
  • Types of Computer Crimes Unauthorized use of a computer Infection of a computer by a malicious program (a virus) Harassment and stalking on the computer Theft of computer equipment Copyright violations of a software Copyright violations of information found on the internet (Sharing Copyright Music or MP3s)
  • Slide 6
  • Computer Fraud Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples of computer fraud include stealing money from bank accounts and stealing information from other peoples computer for gain.
  • Slide 7
  • Signs of Computer Fraud Low staff moral: Unhappy staff members may decide the company owes them. Unusual work patterns. Staff members who appear to be living beyond their income.
  • Slide 8
  • Computer Hacking It involves invading someone elses computer. Usually for personal gain or just the satisfaction of invading someone elses computer. Hackers are usually computer experts who enjoy having the power to invade someone elses privacy. They can steal money, or change or damage data stored on a computer
  • Slide 9
  • Computer Virus A program that has been written usually by a hacker, to cause corruption of data on a computer. The virus is attached to an executable file (like a program file) and spreads from one file to another once the program to executed
  • Slide 10
  • Types of Virus Worm Time Bomb Logic Bomb Trojan Horse
  • Slide 11
  • Worm A worm makes copies of itself, resulting in the consumption of system resources that slows down or actually halts task. Worms dont know to attach themselves to other files.
  • Slide 12
  • Time Bomb A time bomb is virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
  • Slide 13
  • Logic Bomb A logic bomb is a virus triggered by the appearance or disappearance of specified data.
  • Slide 14
  • Trojan Horse A Trojan horse is a virus that does something different from what that is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous)
  • Slide 15
  • Protect Your Computer From Viruses Use antivirus software. This software should always run on your computer and should be updated regularly. Be careful in opening e-mail attachments. It is a good idea to save them to disk before reading them so you can scan them. Dont access files copied from floppy disks or downloaded from the Internet without scanning them first.
  • Slide 16
  • Software Piracy The illegal copying or use of computer programs. Software Programs come with a license number or key that are used to install the program correctly to register it with the company online before you can use the program. FREEWARE Software that is offered online at no cost is call FREEWARE. SHAREWARE SHAREWARE is also available on the internet at no cost to use for a trial period, but then the developer expects to be paid a fee for the software, which may have taken many hours of programming to develop.
  • Slide 17
  • Other Computer Crimes Theft of Computer Time Theft of Computer Time This crime is committed when an employee uses a companys computer for personal use such as running a small side business, keeping personal records. Theft of output Theft of output Using information you see on someones elses screen or printout to profit unfairly. Data Diddling Data Diddling is changing data before it is entered into the computer or after it has been entered into the computer
  • Slide 18
  • Post Qs? What is Computer Crimes? It is a criminal act committed through the use of a computer. What is Computer Fraud? Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Name one sign of computer fraud in a company. Low staff moral, Unusual work patterns, and living beyond their income What is a Hacker? It involves invading someone elses computer. What is a Computer Virus? A program that has been written usually by a hacker, to cause corruption of data on a computer. Name four types of Virus. Worm, Time bomb, Logic bomb, Trojan horse Name one other computer crime. Theft of Computer time and Theft of output
  • Slide 19
  • SECURITY ISSUES Computer Security
  • Slide 20
  • Objective Given instructions, the learner will discuss the network and web security with 85% accuracy.
  • Slide 21
  • Computer Security Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data it to effectively control the access to it. Passwords The most common form of restricting access to data is the use of Passwords (Password are used to protect data against unauthorized users).
  • Slide 22
  • Other Security Measures Electronic identification cards are used to gain access to certain areas within a building or department. Firewalls, which consist of special hardware a software, protect individual companies network form external networks. Antivirus software are used to protect data on your computer.
  • Slide 23
  • Other Security Measures for Companies Institute a very selective hiring process that includes careful screening of potential employee. Regularly back up data and store it offsite. Biometrical Security Measures Employ Biometrical Security Measures, which examine a fingerprint, a voice pattern, or the iris or retina of the eye.
  • Slide 24
  • Cookies Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. It makes it easier for you to use the website when you return and it also provides the Web owner with information.
  • Slide 25
  • Spyware A program installed on your computer without your knowledge, usually when you download a file. Spyware tracks your Web habits and take control over your computer and direct you to websites. Spyware can be harmful as well as annoying; firewalls consisting of hardware and software features can protect your computer from unauthorized spyware programs.
  • Slide 26
  • Piracy Piracy is a theft of intellectual property.
  • Slide 27
  • Laws that Protects Users The Copyright Act of 1976: The Copyright Act of 1976: Protects the developer of software. Software Piracy and Counterfeiting Amendment Software Piracy and Counterfeiting Amendment Electronic Communication Piracy Act, 1986: Electronic Communication Piracy Act, 1986: Prohibits the interception of data communication Computer Fraud and Abuse Act, 1986: Computer Fraud and Abuse Act, 1986: Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communication. Computer Matching & Privacy Protection Act, 1988: Computer Matching & Privacy Protection Act, 1988: Regulates how federal data can be used to determine whether an individual is entitled to federal benefits. Many states also have laws governing computer crimes.
  • Slide 28
  • The Golden Rule Do unto others as you would have them do unto you!
  • Slide 29
  • Post Qs? Why is computer security necessary? Computer security is necessary in order to keep hardware, software, and data safe form harm or destruction? Name a law that has been passed to protect your computer? 1) Copyright Act of 1976, 2) Software Piracy and Counterfeiting Amendment of 1983, 3) Electronic Commission Privacy Act, 1986, 4) Computer Fraud and Abuse Act, 1986, and 5) Computer Matching & Privacy Protection Act, 1988 What is cookies? Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. What is Piracy? Piracy is a theft of intellectual property. What is spyware? A program installed on your computer without your knowledge, usually when you download a file.