Presentation is loading. Please wait.

Presentation is loading. Please wait.

C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.

Similar presentations


Presentation on theme: "C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of."— Presentation transcript:

1

2 C OMPUTER C RIMES

3 “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.” - The American Heritage® Dictionary of the English Language: Fourth Edition. 2000 “This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.” - Wikipedia

4 F ORMS OF C OMPUTER C RIME Theft of Hardware Eg: shoplifting of accessory or taking the whole system unit Theft of Software Software Piracy – unauthorized copying of programs for personal gain Act of using software without the appropriate license RA8293 (Intellectual Property Code of the Phils) declares that computer programs are copyrightable Penalty: 1-3 yrs imprisonment plus fine ranging from P50,000-150,000 for the 1 st offense

5 F ORMS OF C OMPUTER C RIME Theft of Time and Services Eg: Using computer for non-work related things Theft of Information Eg: stealing/selling of personal information (Identity Theft) Crimes of Malice and Destruction Perpetrators are more interested in abusing or vandalizing computer systems Eg: defacing web sites

6 T YPES O F C OMPUTER C RIME Theft. Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information. It is well known that laptop computers are targeted at airports and restaurants. The prize garnered with theft of a laptop is usually the data or information such as passwords for corporate systems contained on the laptops rather than the hardware. Fraud. Fraud on the Internet may run the gamut from credit card offers which are utilized only to capture personal information, to investor postings which promote a stock or investment offer to encourage investment which will benefit the person posting the information, to medical and pharmaceutical -related sites which purport to provide correct medical advice or sell altered medications. Copyright infringement. The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased). Software piracy occurs more easily with the ability to post files for downloading all over the world.

7 V IRUSES A virus is a segment of program code that implants itself to one of the executable files and spreads systematically from one file to another. A virus can only spread from one computer to another when its host is taken to the uninfected computer Functions: Spreads itself from one file to another without the user’s input or knowledge ( Self-replication and Propagation ) Implements the symptom or damage planned by the perpetrator ( Virus Payload ) Include erasing a disk, corrupting programs, create havoc

8 S OME C ATEGORIES OF V IRUSES Boot Sector Viruses Boot Sector – part of the system software that contains most of the instructions for booting up the system. Most hostile type; replaces the boot instructions & loads the virus into main memory before the OS thereby infecting other disks that come in contact with it File-Infecting Viruses Attaches itself to executable files that actually begin a program Worms Programs that spreads by replicating itself and clogs the system with copies of itself Commonly spread via e-mail message attachments Bombs Hides in a user’s disk and waits for a specific event to occur before running

9 S OME C ATEGORIES OF V IRUSES Trojan Horses any program that presents itself as performing one task while actually performing another that causes damage. Usually downloaded from the Internet at a valid and useful program (eg: wallpaper changer). After being run by the user, it can destroy files or replace some other program Stealth Viruses Resides in computer memory making detection difficult Can conceal the damage it created from the user and the OS E-mail Viruses Transmitted as an attachment to an email message

10 H OW TO P ROTECT Y OUR C OMPUTERS FROM V IRUSES ? Avoid high risk sources Most often found on public domain software or from pirated copies of commercial software. Eg. Metacafe, Utorrent and Bittorent Use a virus detection software Before running/opening any file especially those from high risk sources, check the source using a virus detection software Regularly update your virus definitions for the software to be effective Conduct regular virus scan of your computer system Eg: Norton Anti-Virus, Kaspersky, Avira, AVG and etc.

11 W HAT IF A V IRUS IS D ETECTED ? For networked systems, immediately inform the network administrator or any personnel from the MIS or Systems Administrator- Jun Alcantara For personal systems: Use the disinfect/clean function of the virus detection software Erase the infected file

12 C OMPUTER C RIMINALS Employees They commit 80% of the crimes ranging from stealing SW, HW & other peripherals, computer fraud, proprietary information & time Greatest threat from disgruntled employees. Outside Users Clients & other entities who do business with a company can gain access to info & use it to commit crimes. Hackers and Crackers Hackers – people who gain unauthorized access to computer system for fun & challenge Crackers – people who gain unauthorized access for malicious purposes (for financial gain or to destroy data). Organized Crime Use computers for illegal activities such as counterfeiting.

13

14

15


Download ppt "C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of."

Similar presentations


Ads by Google