Computer Crimes Career & Technology Education Department.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics.
VIRUSES and DESTRUCTIVE PROGRAMS
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Viruses, Hacking and Backups By Katie Louise Bieber!
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
COMPUTER VIRUSES Computer Technology.
Computer Basics Technology’s Impact.
Internet Etiquette or Netiquette
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Presentation transcript:

Computer Crimes Career & Technology Education Department

Computer Crimes It is a criminal act committed through the use of a computer –Harassment and stalking on the computer –Unauthorized use of a computer –Computer fraud –Computer hacking –Computer viruses –Software piracy

Virus A program that has been written, usually by a hacker, to cause corruption of data on a computer Can cause major and minor damage to a computer’s data

Viruses May take advantage of network services such as the World Wide Web, and file sharing systems. Are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk.

Types of Computer Viruses Worm –Makes copies of itself Time bomb –Waits for certain date Logic bomb –Triggered by appearance or disappearance of data Trojan horse –Does something different from what it is expected to do

How Viruses Spread Contaminated Disk Communication through the telephone lines (Internet)

Prevention Anti-viral software Write protection on disk Backup original copy Never boot computer with disk

Other Concerns Privacy Security Software Piracy Did You Know? The penalty for copying software can be up to $250,000, five years in prison, or both?

Protection for Technology Injuries The Copyright Act of 1976 Computer Matching & Privacy Protection Act, 1988 Electronic Communication Privacy Act; 1986: Computer Fraud and Abuse Act, 1986: Software Piracy and Counterfeiting Amendment of 1983

Ten Commandments For Computer Ethics 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people’s computer work. 3.Thou shalt not snoop around in other people’s files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness.

Ten Commandments For Computer Ethics (continued) 6.Thou shalt not use or copy software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other peoples intelligent output. 9.Thou shalt think about the social consequences of the program you write. 10.Thou shalt use a computer in ways that show consideration and respect.

Let Us Review What is a computer crime? What is a computer virus? How are viruses created? Name two ways that computer viruses are spread. How can we help prevent viruses? What is Computer Piracy? Copyright Act of 1976 protects…?

Let’s Review 1. What is a computer crime? A criminal act committed through the use of a computer 2. What is a computer virus? A program that has been written, usually by a hacker, to cause corruption of data on a computer

3. How are viruses created? By someone writing a program to cause damage or manipulate information 4. Name two ways that computer viruses are spread. Contaminated disk and telephone lines

5. How can we help prevent viruses? A.Write protect disk B.Use Antiviral software A.Norton Antivirus or McAfee C.Back up original D.Never boot from a disk

6. What is computer piracy? The unauthorized reproduction of a copyrighted work without the consent of the copyright holder. 7. What are some effects of computer piracy? A.Consumers run the risk of infecting their computer with a virus B.Receive not documentation or technical support C.May receive fines or possible jail time if caught

Source Pusins-Well, D. and Ambrose, A. (2001) Basics Computer Concepts. South- Western Computer Education.