Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
How to protect yourself, your computer, and others on the internet
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Let’s Talk About Cyber Security
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Unit 18 Data Security 1.
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Cyber crime & Security Prepared by : Rughani Zarana.
Section 6 Theory Software Copyright, Viruses and Hacking.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
Unethical use of Computers and Networks
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Computer Crimes Career & Technology Education Department.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Basics Technology’s Impact.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Ethical Use of Computers
Presentation transcript:

Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design

Lesson Objectives Identify types of computer crimes. Identify the “work” of hackers. Identify computer viruses. Describe how privacy is invaded because of computer use. Identify various security measures. Describe software piracy. Identify computer-related laws.

Types of Computer Crimes

Definition: Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples –Stealing money from bank accounts –Stealing information from other people’s computers Indicators of computer fraud –Low staff morale: unhappy employees who decide the company owes them. –Unusual work patterns. –Employees who appear to be living beyond their income Computer Fraud

Computer Hacking Definition: invading someone else’s computer, usually for personal gain or just for the fun of it. Usually computer experts Steal money Change or damage data stored on a computer Causes millions of dollars of damage each year

Computer Viruses Definition: a program that has been written, usually by a hacker, to cause corruption of data on a computer. Viruses attach to an executable file Spreads from one file to another once the program is run or used Can cause major damage to a computer’s data Can display messages on the screen

Types Computer Viruses

Computer Virus: Worm Makes many copies of itself until the computer system slows down or actually stops Worms do not have to attach themselves to other files Example: –Dialer.AxFreeAccess is a dialer program that can phone high cost numbers from the compromised computer.

Computer Virus: time bomb Does not cause damage until a certain date or until the system has been booted a certain number of times. Example –BAT.Bomb is a batch script that grows in size, taking up any free space on the hard drive partition on which it resides. This will cause a dramatic slowdown in performance and operating system instability.

Computer Virus: logic bomb Triggered by the appearance or disappearance of specified data

Computer Virus: trojan horse Does something different from what it is expected to do Example –AOL4Free: This trojan horse first searches for the DOS program DELTREE.EXE in various directories, and then uses DELTREE.EXE to delete all files from your C drive.

Ways to protect your computer against virus damage Anti-virus software Scan attachments before you open them Scan other files copied to diskettes or downloaded from the Internet

Other Computer Crimes Theft of time –Committed regularly on a job –An employee uses a company’s computer for personal use Theft of output –Using the information seen on someone’s computer screen Data Diddling –Changing data before or after it is entered into the computer –Usually committed by someone who is entering, recording, encoding, or checking data who has access to documents to change information

Computer crimes are difficult to prove and prosecute.

Other Computer Issues

Privacy Information is being gathered about you as you surf the Internet Companies create databases and sell or trade this information to others The results after being sold causes your name to be added to mailing lists. Lists are used for marketing purposes. Junk (spam) is used for the same purpose. Credit history is also available to be sold. Information sent by at work or school can be accessed without your permission.

Security Need to keep hardware, software, and data safe from harm or destruction Some risks –Natural –Accidents –Intentional Companies protect data by controlling access –Most common form: passwords –Passwords are changed periodically

Other Security Measures Maintain and enforce security measures that are already in place. Electronic identification cards to access certain areas Firewalls (special hardware and software) Anti-virus software Selective hiring process Careful screening of potential employees Regular backing up of data and storing it

Other Security Measures Biometric security measures –Hardware and software used to examine a fingerprint, voice pattern, iris or retina of the eye

Software Piracy Definition: illegal copying and using software If sued for civil copyright infringement, the penalty is up to $100,000 per title infringed. If charged with a criminal violation, the fine is up to $250,000 per title infringed and up to five years imprisonment.

Classifications of Software

Commercial Software Commercial Software is generally developed for license to users for a fee. An example of commercial software is MS Word ®, whose licensor is Microsoft Corporation. Companies that develop and distribute commercial software have become increasingly vigilant about guarding their valuable corporate assets (software copyrights) by pursuing unauthorized users.

Shareware Different from commercial software in that it can be copied (usually by downloading from the Internet) at no cost for a trial period. However, Shareware is still protected by copyright. After the copy of the software is tested or the free trial period expires, the user must purchase a license for the shareware or delete, uninstall or otherwise destroy the copy of the shareware. The software is still protected by copyright law and is subject to the terms of the licensing agreement.

Freeware Software that is protected by copyright but can be copied as either an archival (backup) copy or for use as long as the use is not for profit. Some Freeware can be de-compiled(change it) and modified without the permission of the copyright holder, but generally any new program derived from Freeware must also be designated as Freeware and not sold for profit. It is important to understand that all software that is freely attainable is not Freeware. For example, while Microsoft and Netscape currently distribute respectively Internet Explorer and Navigator browser software for free, neither is Freeware

Public Domain Copyrighted software enters the Public Domain when a copyright holder specifically surrenders all rights to the software. This kind of software is not protected by copyright and can be freely copied, modified or de-compiled without license or permission. Any new programs derived from this software are not subjected to limitations or conditions on distribution. All intellectual property works are assumed by law to be copyrighted. Therefore, for software to become public domain software the holder must explicitly designate such software as being public domain. A user's incorrect assumption that certain software was in the public domain will not likely constitute a valid defense against a charge of copyright infringement.

Laws for Technology Abuse

Copyright Act of 1976 –Protects the developers of software Computer Matching and Privacy Protection Act, 1988 –Regulates how federal data can be used to determine whether an individual is entitled to federal benefits Electronic Communications Privacy Act, 1986 –Prohibits the interception of data communication Computer Fraud and Abuse Act, 1986 –Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communications Software Piracy and Counterfeiting Amendment of 1983 Many states have individual laws governing computer crimes

Organizations Against Piracy

Software and Information Industry Association Represents software developers of all types and sizes Lobby lawmakers for tougher anti-piracy laws Takes proactive steps to stop pirates. The organizations offer rewards to persons who report pirates or acts of piracy Help businesses perform voluntary software audits Works with law enforcement officials to conduct involuntary audits.

Business Software Alliance Promotes global policies that foster innovation, growth and a competitive marketplace for commercial software and related technologies. Strong copyright protections, cyber security and barrier-free trade are crucial to achieving these goals.

Summary Computer crime has become a major problem, costing companies billions of dollars annually. Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit. Computer hacking involves invading someone else’s computer for personal gain. Sometimes it is done for financial gain and sometimes just as a prank. A computer virus is a program that has been written to cause corruption of data on a computer. There are different variations of viruses. These include worms, time bombs, logic bombs, and trojan horses. To protect yourself against viruses, install and keep an antivirus program running on your computer. Be sure to update it regularly.

Summary (cont’d) attachments can contain viruses. It is a good idea to save any message to disk if you are not familiar with the sender. After saving it to a disk, you can scan it for viruses. Personal privacy has been invaded by the computer. Information about our personal lives is freely available. Other computer crimes include theft of computer time, data diddling, and using information from another person’s screen or printouts Companies purchase personal information obtained on the Internet to sell to various companies for marketing purposes. Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data is to control access to the data. The most common way to control access to data is to use passwords. Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses.