Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Computer Viruses and Threats Section 1.03: Identify best practices for computer security and privacy Essential Question: What are the threats to your computer?
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Computer and Society Introduction to: World Wide Web Wild Card
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
Chapter 11 Security and Privacy: Computers and the Internet.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Ethics. Ethics are the principles and standards we use to decide how to act.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter 1 Describe the purpose, components, and use of a computer system.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Viruses & Destructive Programs
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computer Basics Technology’s Impact.
Computing Issues that Affect Us All
Related to data, hardware, and software
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright.
Analyzing Technology Issues
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Unit 6 Digital Literacy Study S3 Obj 2-2
Unit 6 Digital Literacy Study S3 Obj 2-2
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Presentation transcript:

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

Types of Computer Crimes Computer fraudComputer fraud –Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Computer hackingComputer hacking –Involves invading someone elses computer, usually for personal gain or just the satisfaction of invasion. Hacker – A person who secretly gains access to computers and files without permission.Hacker – A person who secretly gains access to computers and files without permission.

Other Computer Crimes Theft of computer timeTheft of computer time –An employee uses a companys computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. Data diddlingData diddling –Changing data before it is entered into the computer or after is has been entered into the computer.

Computer Viruses Virus - a program that has been written to cause corruption of data on a computer.Virus - a program that has been written to cause corruption of data on a computer. Hoax – A program that is intended to scare users into thinking they have a virus. No Virus is attached.Hoax – A program that is intended to scare users into thinking they have a virus. No Virus is attached.

Types of Computer Viruses WormWorm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. It will bore its way through a computers files or go through a computer network.Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. It will bore its way through a computers files or go through a computer network. Time bombTime bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. Logic bombLogic bomb Virus triggered by the appearance or disappearance of specified data.Virus triggered by the appearance or disappearance of specified data. Trojan horseTrojan horse Virus that does something different from what it is expected to do.Virus that does something different from what it is expected to do.

Privacy and Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.

Security Measures Maintain and Enforce Security Measures such as: Passwords (A safeguard for access to a computer or computer program)Passwords (A safeguard for access to a computer or computer program) Electronic identification cardsElectronic identification cards FirewallsFirewalls Antivirus software (program) - (A computer program that detects viruses and repairs files.)Antivirus software (program) - (A computer program that detects viruses and repairs files.) Selective hiring processSelective hiring process

Safe Computing Make back-up copies of all files on a regular basis.Make back-up copies of all files on a regular basis. Dont share disks from other computers – this increases your chance of catching a virus.Dont share disks from other computers – this increases your chance of catching a virus. Dont boot from a floppy disk.Dont boot from a floppy disk. Write-protect your disks.Write-protect your disks.

Safe Computing Use an anti-virus program to scan your files on a regular basis.Use an anti-virus program to scan your files on a regular basis. Use caution when downloading files from the Internet – many are virus infected.Use caution when downloading files from the Internet – many are virus infected. File sharing on a Local Area Network (LAN) may also expose your files to a virus.File sharing on a Local Area Network (LAN) may also expose your files to a virus.

Software Usage Commercial Software – copyrighted by an individual or a business. Permission needed in order to copy.Commercial Software – copyrighted by an individual or a business. Permission needed in order to copy. Shareware – copyrighted protected. Distributed free on a trial basis. Payment by the honor system for satisfied users.Shareware – copyrighted protected. Distributed free on a trial basis. Payment by the honor system for satisfied users. Freeware – Given away free of charge. Owner often retains rights. Not necessarily free to copy and distribute.Freeware – Given away free of charge. Owner often retains rights. Not necessarily free to copy and distribute. Public-Domain Software – Not copyrighted. Donated for public use. Free to copy and distribute.Public-Domain Software – Not copyrighted. Donated for public use. Free to copy and distribute.

Ethics Ethical – conforming to the accepted professional standards of conduct.Ethical – conforming to the accepted professional standards of conduct. Copyright – Protection giving the owner the exclusive right to reproduce or distribute copies of his or her work.Copyright – Protection giving the owner the exclusive right to reproduce or distribute copies of his or her work. License – Tells you what you can and cannot do with a program.License – Tells you what you can and cannot do with a program. Software piracy – illegal copying and distribution of software programs.Software piracy – illegal copying and distribution of software programs. SPA (Software Publishers Association) – group that investigates software copyright violations.SPA (Software Publishers Association) – group that investigates software copyright violations. Intellectual Property – ideas put into action, like writing, music, art, computer programs.Intellectual Property – ideas put into action, like writing, music, art, computer programs.