Presentation on theme: "Created by: Robert McAndrews Career & Technology Education Humble Independent School District."— Presentation transcript:
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Computer crime, cybercrime, e-crime, hi- tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.cybercrimecomputernetworkcrime Computer crime can be defined as criminal activity involving computer information technology systems. --Wikipedia
illegal access (unauthorized access) illegal interception (by technical means of non- public transmissions of computer data to, from or within a computer system) data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data) misuse of devices forgery (ID theft) and electronic fraud Wikipedia
An acceptable use policy (AUP; also sometimes acceptable usage policy) is a set of rules applied by network and website owners which restrict the ways in which the network or site may be used. AUP documents are written for corporations, businesses, universities, schools, and website owners often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.rulesnetworkwebsite ownerssitecorporationsbusinesses universitiesschoolslegal action Wikipedia
http://tlo2.tlc.state.tx.us/statutes/pe.toc.htm http://tlo2.tlc.state.tx.us/statutes/pe.toc.htm PENAL CODE CHAPTER 33. COMPUTER CRIMES What is Penal Code? penal code n. A body of laws relating to crimes and offenses and the penalties for their commission.
Computer Security is used often to describe keeping computer programs and data safe from being damaged or stolen. There is not much risk unless the computer is connected to a network such as the Internet.
Your home computer is a popular target for intruders. intruders Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services.
Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings. Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks.
People with the will and intent to do harm are often referred to as "crackers"--as in "cracking" into computers. Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.passwordsdata computer system
Unauthorized use ◦ Using a computer system without permission Hacking or Cracking ◦ Breaking into computer systems for fun or to damage information. Sabotage and blackmail ◦ Breaking into system to fraud or steal
Piggybacking ◦ Internet access without paying Zapping Data diddling Scavenging Hardware theft ◦ Laptop/notebook computers Software piracy or theft ◦ Federal Crime Information theft ◦ Intellectual property
Piggybacking is a term used to refer to obtaining a wireless internet connection by bringing one's own computer within the range of another's wireless connection without that subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice.wireless internet connectioncomputerwireless connection To get a free ride
When a bug is detected after the software is released, the only way to fix the already compiled code is to overlay the imperfect or buggy code with a sequence of corrected code. This overlaying is known as zapping (verb) and the fix itself is a zap. In generic computing, to zap (verb) can also mean to erase or get rid of something. http://www.csgnetwork.com/glossary.html http://www.csgnetwork.com/glossary.html
Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. http://www.nrps.com/community/comprev.asp http://www.nrps.com/community/comprev.asp
Unauthorized access to information left on discarded media. Going through the garbage to obtain valuable information that can be used to gain access and/or steal. Dumpster Diving.
Stealing a computer or peripheral device such as: keyboard, mouse, printer Software theft The unauthorized and illegal copying of copyrighted software Also known as software piracy or information theft.
Encryptions Backup Procedures Surge Protector ◦ To Prevent System Failures
A potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which it comes in contact with. Illegal computer code that can do such things as alter programs and/or destroy data.
Worm Worm Program Time bomb Logic bomb Trojan horse Virus hoax
Computer or software that has been attacked and to which the virus has attached itself A virus can be spread by an external storage device such as a diskette. Viruses can be spread by downloading from the Internet.
Install an Anti-Virus Program also known as vaccines. Scan Storage Devices before using them ◦ Disks, CD’s/DVD’s, Flash Drives Double Check all Downloaded Files from Internet Do Not Download if source is unknown
The term white hat is used for a person who is ethically opposed to the abuse of computer systems.white hat A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent. security