Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
General Purpose Packages
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Section 6 Theory Software Copyright, Viruses and Hacking.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
CYBER CRIME.
Crime & Malpractice AS Module Heathcote Ch. 10.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Misuses of ICT Malpractice and crime © Folens 2008.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Chapter 13 Security and Ethical Challenges.
How it affects policies and procedures
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module

“Why do we need to be secured? What is computer crime?”. Computers have given workers in most fields new tools to work with. Unfortunately, this is as true for criminals as it is for other professionals. Some categories of computer crime are: Unauthorised access Fraud. Phishing Publication of illicit material

“What is unauthorised access?”. Unauthorised access is usually referred to as ‘hacking’ or ‘cracking’. It involves infiltrating a system to which the individual does not have authorised access. The purpose behind the infiltration varies with the individual. For some hackers the gaining of access is sufficient, some others are more destructive in their intentions.

“What is phishing?”. Phishing is fraudulent computer use in order to steal someone’s identity. This can be done by fraudulently obtaining personal details such as bank accounts, usernames, passwords, usernames...

“What are illicit materials?”. Material such as hard-core pornography cannot legally be published and sold in many countries. However, the Internet is transnational in its scope so illicit material can be created in a country where is legal and viewed in a country where it is not. Another example is the publication of material likely to incite racial hatred. Were materials of this kind made available through a shop, the owner and publisher could be prosecuted. It is much harder to do so online due to the international ‘ownerless’ nature of the internet.

“Are we really secure?”. Before we explain other dangers or the legislation that deals with these crimes, let’s watch some interesting videos on the topic: -Cyber crime risk exposedCyber crime risk exposed -Growing threat of cyber crimeGrowing threat of cyber crime -Is your PC doing a hacker’s dirty work?Is your PC doing a hacker’s dirty work? -How cyber criminals attack websitesHow cyber criminals attack websites

“What is a virus?”. A virus is a computer program that has been specifically designed to infiltrate a `host’ computer, to hide itself in that computer, and then, following a designated trigger event, perform actions that are, at best, an annoyance and, at worst, catastrophically destructive. A virus is so called because, like its biological counterpart, it has the ability to replicate itself and spread to other ‘hosts’ infecting them as it does so. There are two types of virus: File viruses (they attach themselves to an executable file) and Macro viruses (they use the macro facility offered by some programs such as Microsoft Office products).

“Examples of viruses”. An example of a virus is Zeus (as seen in “growing threats of cyber crime” video). It was distributed to unsuspecting users as an innocent looking . Once activated, Zeus infected the computer and secretly logged sensitive information like passwords, account numbers and financial information. Hackers then used this information to make unauthorised money transfers. Viruses can be extremely advanced and controversial. Stuxnet includes highly specialized malware written specifically to target the nuclear plants in Iran. There has been speculation that Stuxnet was in fact programmed and released into the wild by the American and/or Israeli government(s).

“The evil nature of Botnets”. Botnets are networks of compromised computers which are now under the control of the hackers. As we have seen in the introductory videos, botnets are used to control, manage and distribute malicious things such as viruses, spams and DDoS attacks. Compromised users have no knowledge that they are part of a botnet. Botnet owners take pride in who has the most bots and the “quality” of their infected machines, like university, corporate or even government machines.

“DDoS Attacks (Distributed Denial of Service)”. DDoS attacks are a combination of two different concepts. A denial of service attack occurs when a computer sends so much data to another computer that they become unable to process any other requests. The other component of a DDoS is its distributed nature. As we have seen with botnets, it is no longer the case that hackers attack with single machines. Imagine a DoS attack against your company’s website. Now, multiply that by 5 million. That’s one estimate of the number of infected users during Zeus’ peak.

“DDoS Attacks (Distributed Denial of Service)”.

“Some advice to stay on the safe side”. -Don't click on any links in s that are from people you don't know (or dodgy-looking mails from people you do know as they could be unsuspecting victims) - it could install a key logger onto your system for example. -Install and continually update anti-virus software. -Virus check all external storage media before using them. -Scan and check any software downloaded from the Internet

“Protecting systems”. Some advice to protect your system: -Firewalls (combination of hardware and software resources, designed to check the legitimacy of incoming messages and requests for services). -Access procedures (always protect access to networks by password systems. Make sure that the password is complex and secure and not just your birthday, pet’s name, etc). -Encryption (it may be used to make stored data more secure).

“Complying with the law” All organisations have to operate within a legal framework. Because an organization is responsible for the actions of its employees while they are at work, it must ensure that they are fully aware of their rights and responsibilities under the law. There are a wide range of laws, but we will only centre on some key pieces of legislation that affect organisations in the UK: Data Protection Act, Computer Misuse Act, Health and Safety at Work Act (which we saw in our first module) and Copyright Designs and Patents Act.

“The Data Protection Act 1998” The DPA first became law in It was amended in 1998 after the EU published its Data Protection Directive (1995). It was the consequence of increasing concerns about the number of computer-based systems that store data. The main aim of this legislation is to protect the rights of individuals who have data held on them by organisations. The organization needs to ensure that data is held securely, that its accuracy is maintained and that it is used legitimately.

“The Computer Misuse Act 1990” The Computer Misuse Act became a law in It was designed to prevent computer crimes involving unlawful access to information systems. Offences under the Computer Misuse Act are: 1.Gaining unauthorised access to data or programs on a computer. 2.Gaining unauthorised access with intent to commit a further serious offence. 3.Intentional unauthorised modification to impair operation.

“Copyright Designs and Patents Act 1988” The Copyright Designs and Patents Act of 1988 is designed to protect the ownership rights of the originators of intellectual property such as design, music and software. The three main areas where legislation may be needed in relation to ICT are: -Software piracy and licensing: the use of ICT to copy or download material such as music/video/text-based files, thus avoiding the price of purchase. -The theft by one company of the ideas and methods of other companies.

“Health and Safety at Work Act 1974” Health and safety legislation is designed to protect employees in the workplace. There are some specific concerns relating to the use of ICT (as we saw in our first module) and organisations must have measures in place to ensure the welfare of their employees. If an organization is negligent in this area and an employee suffers injury as a consequence, the organization can be deemed liable and may have to make compensations payments.

“Conclusion” In this fourth module we have seen: -The three major categories of computer crime. -Computer dangers such as viruses, botnets and Ddos attacks. -Some measurements to stay secure online. -The key pieces of legislation that deals with computer. (Don’t forget to re-read the class handouts for our last exam!)