Computer Crimes and Health & Safety Objectives: Gain an overview of Computer Crime and Health & Safety issues so that you can write about them in your.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Health and Safety The risks involved in working with ICT © Folens 2008.
Some tips to be safety Healthy Computing.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Issues Raised by ICT.
Personal Development Health and Safety.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
General Purpose Packages
Describe the benefits and inherent dangers of widespread use of the Internet, chat rooms and forums. Dangers Addiction – spending vast amounts of time.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Health and Safety Matthew brings YOU, what YOU should know about health and safety in the I.C.T. workplace.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Computers and your health. Health and Safety – Why?  People have a right to be safe at work.  All employers must do as much as they can to ensure that.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Workbook 2 Task 1.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Health and safety in relation to the use of ICT systems
3.4 Health and Safety. Overview Safety including RSI, ergonomics, ELF radiation and eyestrain Identify measures taken by both the employee and employer.
Legal issues Health issues.
Impact of ICT on Health & Safety. Regular Use Of Computers Can Cause:- RSI (Repetitive Strain Injury) Eyestrain & Headaches Exposure to Radiation Stress.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
HEALTHY COMPUTING Some tips to be safe. P OSSIBLE DANGERS AND SOLUTIONS ♥ Within information technology it is important that people have an awareness.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computer security By Isabelle Cooper.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
 Under the Health and Safety Act 1974 employers and employees are responsible for ensuring their own safety and that of others.  This legislation applies.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Within information technology it is important that people have an awareness of the various health and safety issues. Steps should also be taken towards.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Lesson 4 Health and Safety Learn how to stay safe when using a computer. Highlight specific things that may effect you at school AIM:
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Health issues.
Impact of ICT on Health & Safety. Regular Use Of Computers Can Cause:- RSI (Repetitive Strain Injury) Eyestrain & Headaches Exposure to Radiation Stress.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Coleg Gwent Ergonomics. Coleg Gwent What does it mean?
GCSE ICT Computers and your health. Health and Safety – Why? People have a right to be safe at work. People have a right to be safe at work. All employers.
The risks involved in working with ICT
Information Technology
The risks involved in working with ICT
Impact of ICT on Health & Safety
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
(with special thanks to Year 1 Sport)
How it affects policies and procedures
Impact of ICT on Health & Safety
G061 - Network Security.
Presentation transcript:

Computer Crimes and Health & Safety Objectives: Gain an overview of Computer Crime and Health & Safety issues so that you can write about them in your project

Computer Crimes Hacking Theft of computer time Theft of software and data Software Piracy Viruses

Hacking Unauthorised access to a computer and.or data Why Hack?  Just to prove that they can  Industrial Espionage  Attempt to destroy business/data  Blackmail  Grudge

Preventing Hacking Secure Passwords  Letters & Numbers  Not real words  Biometrics Regular password changes Access Rights Firewall

Theft of computer time Employees using computers for personal business  NRA/CV  Personal Letters/  Run another business  Games Costs money  System resources  Lost Productivity

Computer Crime COPYRIGHT

Theft of Software and Data Bespoke software is valuable to a business  May give a commercial advantage  Has value to competitors Same is true of data  Ingredients for new chocolate bar  Plans for new car Difficult to prevent theft (usually done by own staff)  Access Rights  Passwords  Escort sacked / redundant employees from building

Software Piracy Software companies do not sell software – they sell a licence to use the software  Single User  Concurrent Users  Network Stations  Site Licence Some licences will allow employees to have a copy of the software at home – most do not.

Software Piracy Employees can be stopped from stealing software by:  Prevent Access to original media  Prevent access to Floppy/Optical disk drives  Dongles Bigger problem – large scale software pirates  Action taken at Governmental level and by specialist organisations.

What is software Piracy? The use of Software without a valid licence Unauthorised copying of Diskettes or CDs Running pirated software Transmitting unauthorised software over a telecommunications line.

How come this is illegal? When you buy software you do not own it you only have the right to use the program by having a licence Computer software is now covered by the Copyright Designs and Patents act of 1989

Why is it a problem? Software companies do not get the profit they would get if every user bought a legitimate licence. This can discourage future development.

How are software companies trying to stop copyright fraud? Registration numbers before installing the product “copy protection” on CDs or disks that makes it difficult to copy them “dongles” (a piece of hardware that must be plugged into the back of the computer for the program to run)

How are software companies trying to stop copyright fraud? Businesses, schools etc. can be inspected to ensure they have sufficient licences for their software. On some games you have to enter a word from the manual each time you play.

A "single user licence" allows you to run the software on one computer A "network licence" allows you to run the software on a specified number of machines A "site licence" allows you to run the software anywhere on the site Licences

The penalty Software piracy is a criminal offence you can be given an unlimited fine or sent to prison for 2 years! Large companies can be fined greater amounts - depending on the scale of their business.

Large companies do commit software piracy! Apple sued Microsoft because they claimed that Microsoft copied the "look and feel" of their operating system, however they were unsuccessful. Other companies steal chunks of code from one program to use in their own programs. Developers now insert hidden "fingerprints" into the code so they can see if they turn up in a competitors product.

Computer Crime Viruses

A virus is a program that affects computers and the software running on them.  Attaches itself to a program or file  Can cause damage & destroy essential files.  Can spread through an whole network

Viruses A virus can be:  Destructive  Annoying A virus may trigger immediately or not until a trigger date (e.g. Friday 13 th ) Often infected files will have to be deleted – non-infected backups will be needed to restore the system

Other virus type programs Trojan Horse  Runs in the background and is designed to collect passwords & ID’s Bombs  Program that will cause damage when triggered  E.g. could be triggered if an employee is sacked to destroy important file or to hide fraud

Preventing Viruses Always run anti virus software Make sure the virus definition file is up to date. Do not open s or attachments from unknown senders. Always virus check floppy disks when you have been using them on a different machine. REGULARLY BACK UP YOUR WORK!!!

Health & Safety

Seating –  Use chairs with adjustable height and back-rest.  When seated correctly, the lower arms and thighs should be in a roughly horizontal position while working at the keyboard.

Health & Safety Workstation – A fixed height between mm is required (720mm is recommended). A desktop depth of mm is required to give the user sufficient distance from the screen while working.

Health & Safety Lighting –  Windows should be fitted with non- reflective blinds.  Positioning the screen away from light reflection and glare.  The optimum position is at right angles to the source of natural light.

Health & Safety Screens –  Screens must be fitted with tilt and swivel stands.  Sufficient room is needed for the screen to be moved back and forward.  The top of the screen should be at eye level.

Health & Safety Power supply –  Leads should preferably be in trunking above the height of the worktops or be safely tied.  An adequate number of supply sockets should be provided to eliminate the need for trailing wires.  Mains plugs and leads must be checked for safety once a year.

Health & Safety Fire precautions –  A fire extinguisher suitable for electrical fires (such as carbon dioxide) must be provided in all computer rooms.  The location of the nearest fire exit must be notified near the door in each room

Health & Safety Repetitive Strain Injury (RSI)  Caused by repetitive finger movements over very long periods of time.  It can become quite serious for people employed solely as keyboard operators.  In order to reduce muscle fatigue and strain, users should be encouraged to get up and move around at reasonably frequent intervals

Health & Safety Eye Strain –  To reduce eyestrain, look away from the screen and focus on a distant object from time to time - this will relax their eye muscles.  Take regular breaks – This also helps to combat STRESS…

Health & Safety Food & Drink  It is not a good idea to eat and drink at your computer.  Spilling a drink over the computer or keyboard won’t just break the machine, the resulting electric shock could kill you!