Presentation is loading. Please wait.

Presentation is loading. Please wait.

What are the computer crimes? And how these can be prevented. Adriana Portela Guadalupe & Carola M. Falú Feliú Caribbean Computing Center for Excellence.

Similar presentations


Presentation on theme: "What are the computer crimes? And how these can be prevented. Adriana Portela Guadalupe & Carola M. Falú Feliú Caribbean Computing Center for Excellence."— Presentation transcript:

1 What are the computer crimes? And how these can be prevented. Adriana Portela Guadalupe & Carola M. Falú Feliú Caribbean Computing Center for Excellence (CCCE) Inter American University Many people work and make transactions through the Internet, and most young adults spend a lot of time on social networking sites. Many times computer users think that these transactions and profiles are protected, when in fact they face a strong possibility of being victims of fraud, password theft, or many other “computer crimes”. The purpose of this descriptive investigation was to study computer crimes and their prevention. Different crimes that can be performed through the use of computers or networks are presented and described. Also, methods or programs that can be used to protect users against computer crimes or cybercrimes are included. After acquiring this knowledge, computer and network users can navigate with the certainty of being protected. Today, computer crimes are becoming more common and will eventually grow, hence it should be a good protection of our computer and network because even our identity is at stake. These crimes are so dangerous that many of them are sentenced to life imprisonment. We hope you to get this information to protect themselves and not make the mistake of committing or aiding and be part of these crimes. And we hope that this information will be helpful in the future and we hope you liked it and thanks. According to the information found during our research of computer-related crime is divided into two categories, these are: those that are intended to damage computer networks and those that are made from a computer or internet. The crimes that are in the first category are: The installation of codes (pumps), which is a program that affect the mailbox causing thousands of messages to enter and destroy all electronic information filed and as a result leaves a useless email. Among other crimes is the "spam" emails that are unsolicited or unwanted advertising content, mostly are loose and contain virus or filtered pages. The latest crime in this category is the famous virus or malware that aims to damage or alter normal computer operation. There are different types of these as they may be those which are just annoying, until those that delete information or damage the computer in its entirety. In the second category mentioned above, there are many crimes and cybercrime, among them are: fraud, harassment and child pornography, hackers, and virtual terrorism, among others. The fraud has different ways to get the information to carry out, among them we find: it is the phishing emails sent as if from illegitimate organizations to request personal information which is then used for identity theft and fraud, there are also key loggers which is sending an email with an attachment which when opened infects the computer with no trace, when the user enters passwords or information, that is stored in a file and is sent to the person to conducts the fraud. Third, there are the zombies which are programs that are classified as viruses that take control of your computer and notify the creator so that he or she can make the damage he or she desires to make. Among the other crimes of this category as mentioned above are the harassment that today is known as "cyber bullying" which is the offensive messages sent to a person or group either by sex, race, nationality, religion or sexual orientation. In addition to this crime is child pornography which can be sentenced to life imprisonment when committed, this is the publication of pornographic material in which minors appear. As the last one, virtual terrorism is massively attacking a company’s computer system, offices’ systems, among many others. These computer crimes are not good for our computers so throughout the years there have been many tools created to protect our computers when many of these crimes can enter through a simple email. Among the most used tools is the antivirus. This is a tool that helps you detect infections that can be to the computer and remove computer viruses. Today, an antivirus is able to block a virus, disinfect the computer, and prevent the virus from reaching the computer’s internal system, and is also able to recognize the malware, spyware, among others. There is also a tool called "firewall" which serves as a wall to filter information entering and leaving the computer or network by blocking unauthorized access. The firewall must be implemented in software, hardware or both, but never to work alone in the protection of a computer. In addition to these programs, there are many others that are responsible to seek, detect and remove what could be a crime, an example is a anti-spyware that takes care of spyware on your system, there are the anti- spam, anti-pop-up, the PKI (public key infrastructure) that support safe commercial transactions, among others, but many of them are integrated into the antivirus. There is also an Intrusion Detection System (IDS) which is the one that detects unwanted manipulation, mostly created by hackers. It has three types: HIDS monitors only one computer, NIDS monitors a network and DIDS finally makes the role of multiple NIDS. Another form of encryption to protect the "encrypt" which is the process of making information unreadable so unauthorized persons cannot read the encrypted information; it can only be read by a key. And today because technology has created biometric devices which is how we ensure identity with the most used, the fingerprint. And this has been created as the safest way to access and only authorized individuals can access because a password can be passed, a key can be stolen, but not identity. Research Mentors: Dr. Ángel Caraballo and Prof. Irma Alvarez Research Mentors: Dr. Ángel Caraballo and Prof. Irma Alvarez Outside research mentor: Pedro J. Lugo Outside research mentor: Pedro J. Lugo Our group of the program in the Inter American University. Our group of the program in the Inter American University. Expert in computer area: Marcos Osorio, Lino Rodriguez, Graciela Rivera and Camille Maldonado Expert in computer area: Marcos Osorio, Lino Rodriguez, Graciela Rivera and Camille Maldonado Criminal Justice Expert: Lyn N. Merced Criminal Justice Expert: Lyn N. Merced Helper in the search of information (B.A. Criminology): Daniel Zen ó n Helper in the search of information (B.A. Criminology): Daniel Zen ó n Helper in English language: Jorge L. Hernandez Helper in English language: Jorge L. Hernandez Questioner Respondents of the Inter American University Questioner Respondents of the Inter American University CHART or PICTURE http://www.lexjuris.com/lexlex/Leyes2009/lexl2009Menu.htm http://www.lexjuris.com/lexlex/Leyes2009/lexl2009Menu.htm http://www.informaticaforense.com/criminalistica/faqs/general/que-es-la-informatica-forense.html http://www.informaticaforense.com/criminalistica/faqs/general/que-es-la-informatica-forense.html http://es.wikipedia.org/wiki/Delitos_informáticos http://es.wikipedia.org/wiki/Delitos_informáticos http://www.acis.org.co/fileadmin/Revista_96/dos.pdf http://www.acis.org.co/fileadmin/Revista_96/dos.pdf http://es.wikipedia.org/wiki/Spam http://es.wikipedia.org/wiki/Spam http://www.urru.org/papers/RRfraude/InformaticaForense_OL_HA_RL.pdf http://www.urru.org/papers/RRfraude/InformaticaForense_OL_HA_RL.pdf www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm http://ines.pr21.tripod.com/new_page_1.htm http://ines.pr21.tripod.com/new_page_1.htm http://www.ausejo.net/seguridad/forense.htm http://www.ausejo.net/seguridad/forense.htm p://www.alegsa.com.ar/Notas/182.ph http://www.alegsa.com.ar/Notas/182.php http://www.neotec.com.pa/pdf/introduccionalosbiometricos.pdf http://www.neotec.com.pa/pdf/introduccionalosbiometricos.pdf CHART or PICTURE Select a topic of interest relevant to computers to abound and do a descriptive research. Select a topic of interest relevant to computers to abound and do a descriptive research. Recognize the tools necessary to proceed with the research. Recognize the tools necessary to proceed with the research. Elaborate a plan of investigation to order concepts already acquired. Elaborate a plan of investigation to order concepts already acquired. Acquire information of reliable sources like libraries, database, reference centers, etc. Acquire information of reliable sources like libraries, database, reference centers, etc. Acquire more information from sources like professors, professionals in the material and general public by interviewing and surveying. Acquire more information from sources like professors, professionals in the material and general public by interviewing and surveying. Organize and analyze the compiled information. To classify the information by sub subjects and then identify of this the most important and less important things. Organize and analyze the compiled information. To classify the information by sub subjects and then identify of this the most important and less important things. Structure and write up the compiled information, so that this can be legible for the public to who is going to be presented or displayed. Structure and write up the compiled information, so that this can be legible for the public to who is going to be presented or displayed. Develop the strategies in which the work will be presented or displayed. Develop the strategies in which the work will be presented or displayed. BACKGROUND METHODOLOGY USED TO EMPLOY THE RESEARCH RESULTSCONCLUSIONS BIBLIOGRAPHY ACKNOWLEDGEMENT The purpose of this research is to alert the community about crimes that prey on the computerized technology community today, so that they have knowledge of which are the crimes that occur today through computers and networks, and help people who use computers, to protect themselves from these so they can navigate protected. Also satisfy the requirement of the proposal led by the Caribbean Computer Center of Excellence (CCCE) at the University of Puerto Rico at the Metropolitan campus, which is a program where research on computer science is used to motivate young students in grades 10, 11 and 12 to study in the area of computers, and finally to motivate us to live the experience of performing this research work that can be observed. PURPOSE 27% of respondents knew that it’s the computer forensics, but the other 73% of respondents didn’t know. In that 27%,an 87.5% know the correct definition and the other 12.5% have an idea but not is the correct.


Download ppt "What are the computer crimes? And how these can be prevented. Adriana Portela Guadalupe & Carola M. Falú Feliú Caribbean Computing Center for Excellence."

Similar presentations


Ads by Google