Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
For Students of Humble ISD
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Viruses & Destructive Programs
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Unit 2 - Hardware Computer Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
BUSINESS B1 Information Security.
Computer Security, Ethics and Privacy Chapter 11.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Issues, Ethics, & Emerging Technologies in Education
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer security By Isabelle Cooper.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Technical Implementation: Security Risks
IT Security  .
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BCT 2.00 Analyze Technology Issues
Malware, Phishing and Network Policies
Faculty of Science IT Department By Raz Dara MA.
Computer Security.
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

 Computer crime, cybercrime, e-crime, hi- tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.cybercrimecomputernetworkcrime  Computer crime can be defined as criminal activity involving computer information technology systems. --Wikipedia

 illegal access (unauthorized access)  illegal interception (by technical means of non- public transmissions of computer data to, from or within a computer system)  data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data)  systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data)  misuse of devices  forgery (ID theft) and electronic fraud Wikipedia

 An acceptable use policy (AUP; also sometimes acceptable usage policy) is a set of rules applied by network and website owners which restrict the ways in which the network or site may be used. AUP documents are written for corporations, businesses, universities, schools, and website owners often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.rulesnetworkwebsite ownerssitecorporationsbusinesses universitiesschoolslegal action Wikipedia

  PENAL CODE  CHAPTER 33. COMPUTER CRIMES What is Penal Code? penal code n. A body of laws relating to crimes and offenses and the penalties for their commission.

 Computer Security is used often to describe keeping computer programs and data safe from being damaged or stolen.  There is not much risk unless the computer is connected to a network such as the Internet.

 Your home computer is a popular target for intruders. intruders  Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find.  By stealing that information, intruders can use your money to buy themselves goods and services.

 Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings.  Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks.

 People with the will and intent to do harm are often referred to as "crackers"--as in "cracking" into computers.  Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.passwordsdata computer system

 Unauthorized use ◦ Using a computer system without permission  Hacking or Cracking ◦ Breaking into computer systems for fun or to damage information.  Sabotage and blackmail ◦ Breaking into system to fraud or steal

 Piggybacking ◦ Internet access without paying  Zapping  Data diddling  Scavenging  Hardware theft ◦ Laptop/notebook computers  Software piracy or theft ◦ Federal Crime  Information theft ◦ Intellectual property

 Piggybacking is a term used to refer to obtaining a wireless internet connection by bringing one's own computer within the range of another's wireless connection without that subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice.wireless internet connectioncomputerwireless connection To get a free ride

 When a bug is detected after the software is released, the only way to fix the already compiled code is to overlay the imperfect or buggy code with a sequence of corrected code. This overlaying is known as zapping (verb) and the fix itself is a zap.  In generic computing, to zap (verb) can also mean to erase or get rid of something. 

 Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. 

 Unauthorized access to information left on discarded media.  Going through the garbage to obtain valuable information that can be used to gain access and/or steal.  Dumpster Diving.

 Stealing a computer or peripheral device such as: keyboard, mouse, printer Software theft  The unauthorized and illegal copying of copyrighted software  Also known as software piracy or information theft.

 Passwords ◦ Remembered Information  Possessed Objects ◦ Badges, cards, keys  Biometric Devices ◦ Fingerprint, signature ◦ eye or voice patterns

 Encryptions  Backup Procedures  Surge Protector ◦ To Prevent System Failures

 A potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which it comes in contact with.  Illegal computer code that can do such things as alter programs and/or destroy data.

 Worm  Worm Program  Time bomb  Logic bomb  Trojan horse  Virus hoax

 Computer or software that has been attacked and to which the virus has attached itself  A virus can be spread by an external storage device such as a diskette.  Viruses can be spread by downloading from the Internet.

 Install an Anti-Virus Program also known as vaccines.  Scan Storage Devices before using them ◦ Disks, CD’s/DVD’s, Flash Drives  Double Check all Downloaded Files from Internet  Do Not Download if source is unknown

 The term white hat is used for a person who is ethically opposed to the abuse of computer systems.white hat  A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent. security