Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security, Privacy, and Ethics Online Computer Crimes.

Similar presentations


Presentation on theme: "Security, Privacy, and Ethics Online Computer Crimes."— Presentation transcript:

1

2 Security, Privacy, and Ethics Online Computer Crimes

3 Objective  Given instructions, the learner will discuss the network and web security with 85% accuracy.

4 Computer Crimes It is a criminal act committed through the use of a computer.

5 Types of Computer Crimes Unauthorized use of a computer Infection of a computer by a malicious program (a virus) Harassment and stalking on the computer Theft of computer equipment Copyright violations of a software Copyright violations of information found on the internet (Sharing Copyright Music or MP3s)

6 Computer Fraud Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples of computer fraud include stealing money from bank accounts and stealing information from other people’s computer for gain.

7 Signs of Computer Fraud Low staff moral: Unhappy staff members may decide the company owes them. Unusual work patterns. Staff members who appear to be living beyond their income.

8 Computer Hacking It involves invading someone else’s computer. Usually for personal gain or just the satisfaction of invading someone else’s computer. Hackers are usually computer experts who enjoy having the power to invade someone else’s privacy. They can steal money, or change or damage data stored on a computer

9 Computer Virus A program that has been written usually by a hacker, to cause corruption of data on a computer. The virus is attached to an executable file (like a program file) and spreads from one file to another once the program to executed

10 Types of Virus Worm Time Bomb Logic Bomb Trojan Horse

11 Worm A worm makes copies of itself, resulting in the consumption of system resources that slows down or actually halts task. Worms don’t know to attach themselves to other files.

12 Time Bomb A time bomb is virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

13 Logic Bomb A logic bomb is a virus triggered by the appearance or disappearance of specified data.

14 Trojan Horse A Trojan horse is a virus that does something different from what that is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous)

15 Protect Your Computer From Viruses Use antivirus software. This software should always run on your computer and should be updated regularly. Be careful in opening e-mail attachments. It is a good idea to save them to disk before reading them so you can scan them. Don’t access files copied from floppy disks or downloaded from the Internet without scanning them first.

16 Software Piracy The illegal copying or use of computer programs. Software Programs come with a license number or key that are used to install the program correctly to register it with the company online before you can use the program. FREEWARE Software that is offered online at no cost is call FREEWARE. SHAREWARE SHAREWARE is also available on the internet at no cost to use for a trial period, but then the developer expects to be paid a fee for the software, which may have taken many hours of programming to develop.

17 Other Computer Crimes Theft of Computer Time Theft of Computer Time – This crime is committed when an employee uses a company’s computer for personal use such as running a small side business, keeping personal records. Theft of output Theft of output – Using information you see on someone’s else’s screen or printout to profit unfairly. – Data Diddling – Data Diddling is changing data before it is entered into the computer or after it has been entered into the computer

18 Post – Qs? What is Computer Crimes? – It is a criminal act committed through the use of a computer. What is Computer Fraud? – Is conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Name one sign of computer fraud in a company. – Low staff moral, Unusual work patterns, and living beyond their income What is a Hacker? – It involves invading someone else’s computer. What is a Computer Virus? – A program that has been written usually by a hacker, to cause corruption of data on a computer. Name four types of Virus. – Worm, Time bomb, Logic bomb, Trojan horse Name one other computer crime. – Theft of Computer time and Theft of output

19 SECURITY ISSUES Computer Security

20 Objective Given instructions, the learner will discuss the network and web security with 85% accuracy.

21 Computer Security Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data it to effectively control the access to it. Passwords The most common form of restricting access to data is the use of Passwords (Password are used to protect data against unauthorized users).

22 Other Security Measures Electronic identification cards are used to gain access to certain areas within a building or department. Firewalls, which consist of special hardware a software, protect individual companies’ network form external networks. Antivirus software are used to protect data on your computer.

23 Other Security Measures for Companies Institute a very selective hiring process that includes careful screening of potential employee. Regularly back up data and store it offsite. Biometrical Security Measures Employ Biometrical Security Measures, which examine a fingerprint, a voice pattern, or the iris or retina of the eye.

24 Cookies Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. It makes it easier for you to use the website when you return and it also provides the Web owner with information.

25 Spyware A program installed on your computer without your knowledge, usually when you download a file. Spyware tracks your Web habits and take control over your computer and direct you to websites. Spyware can be harmful as well as annoying; firewalls consisting of hardware and software features can protect your computer from unauthorized spyware programs.

26 Piracy Piracy is a theft of intellectual property.

27 Laws that Protects Users The Copyright Act of 1976: The Copyright Act of 1976: Protects the developer of software. Software Piracy and Counterfeiting Amendment Software Piracy and Counterfeiting Amendment Electronic Communication Piracy Act, 1986: Electronic Communication Piracy Act, 1986: Prohibits the interception of data communication Computer Fraud and Abuse Act, 1986: Computer Fraud and Abuse Act, 1986: Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communication. Computer Matching & Privacy Protection Act, 1988: Computer Matching & Privacy Protection Act, 1988: Regulates how federal data can be used to determine whether an individual is entitled to federal benefits. Many states also have laws governing computer crimes.

28 The Golden Rule “Do unto other’s as you would have them do unto you!”

29 Post – Qs? Why is computer security necessary? – Computer security is necessary in order to keep hardware, software, and data safe form harm or destruction? Name a law that has been passed to protect your computer? – 1) Copyright Act of 1976, 2) Software Piracy and Counterfeiting Amendment of 1983, 3) Electronic Commission Privacy Act, 1986, 4) Computer Fraud and Abuse Act, 1986, and 5) Computer Matching & Privacy Protection Act, 1988 What is cookies? – Small files that are created when you visit a Website and are stored on your computer, then accessed again the next time you visit the site. What is Piracy? – Piracy is a theft of intellectual property. What is spyware? – A program installed on your computer without your knowledge, usually when you download a file.


Download ppt "Security, Privacy, and Ethics Online Computer Crimes."

Similar presentations


Ads by Google