ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
What Are the Functions of ATM Machines?
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
CEL: Computers in Banking and Retail
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
ICT at Work Banking and Finance.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Debit cards Shumate – 5th Period.
Methods of payment on business trips From booking flights and accommodation to paying for meals, there are a variety of different payment methods available.
Sample Check Register. Sample Blank Check Register.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Security, Privacy, and Ethics Online Computer Crimes.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
3.1 Business and employment. Banking and Finance.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Credit cards and Debit Cards, Credit and Debt
Credit Card vs. Debit Card. Debit Cards Also called “check cards” –Works just like writing a check Deducts money from your checking account.
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
General Purpose Packages
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Payment Methods and Credit. In This Lesson: 1.Compare the advantages and disadvantages of using various payment methods. 2.Differentiate between a debit.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Crime & Malpractice AS Module Heathcote Ch. 10.
Checking Accounts. What is a checking account? A bank account that allows easy access to the funds. You can use your checking account to pay bills. With.
EFTPOS and credit card payments Rachel Garcia Line 4 Due:14 th November Business Admin Michael Barry.
ICT and Banks Banks use mainframe computers to maintain customer accounts. They store a record of each customer’s withdrawals and deposits. Each bank mainframe.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
HOW TO FINANCE YOUR LIFE Financial Literacy. Savings Accounts Saving – The process of setting money aside for a future date instead of spending it today.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Banking How banks work along with checking accounts.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Checking Account. Key Terms Check Online and smartphone banking Deposit/credit Automated Teller Machines (ATMs) Debit Overdrawn Balance/reconcile Overdraft.
GOALS BUSINESS MATH© Thomson/South-WesternLesson 3.2Slide 1 3.2Electronic Banking Record electronic banking transactions Find account balance when banking.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Checking Account & Debit Card Understanding Checking Accounts and Debit Card Transactions.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Electronic Banking & Security Electronic Banking & Security.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Credit & Debit Cards: Advantages and Disadvantages
Take Charge of Your Finances
Electronic/Online Banking & Bill Pay
Information on Types of Electronic Banking
Depository Institution Essentials
Take Charge of Your Finances
Take Charge of Your Finances
Presentation transcript:

ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards – has led to a rise in computer crime. Now that companies and people no longer use cash as much as they did in the past, stealing money using a computer has become more frequent. For this purpose,there companies are using following cards Credit Debit Store cash cards Magnet strip of account information.

ANS(Prepared by: Mazhar Javed )2 Credit Cards Credit cards allow users to pay for goods as and when they need them, and then to pay a single bill (or part of what is owed) at the end of a month. instant credit against goods bought or cash from ATM. Need to sign a receipt, signature checked, receipt goes off to credit card company. Usually machine with telephone connection to credit card company authorises the payment, checks whether the customer has credit. If goods are bought over the telephone or Internet there is no receipt until it arrives with the goods. The owner chooses how much to pay off the balance each month, subject to a minimum payment. Interest is paid on unpaid balances.

ANS(Prepared by: Mazhar Javed )3 Debit cards Debit cards have replaced cheques as a means of payment, and the money is taken out of the user’s bank account. They are also used to get cash from cash machines (also known as Automatic Teller Machines [ATM], ‘holes in the wall’, or bank machines). A debit card holder who is using an Automatic Teller Machine to withdraw money from their bank account identifies themselves by the use of a PIN (personal identification number). Although this should be more secure than using a credit card, users often use a PIN that they keep with their debit card or allow strangers to watch them input the numbers on the ATM keypad.

ANS(Prepared by: Mazhar Javed )4 Debit and credit card use Since the introduction of debit and credit cards in the 1980s, there has been a continual battle between the debit and credit card providers – the banks and credit card companies – and fraudsters. As each new security device has been added, the fraudsters have tried to find ways to get round them. The first debit and credit cards relied upon encrypted (encoded) data that was stored on magnetic tape on the back of the card.

ANS(Prepared by: Mazhar Javed )5 Debit and credit card use The growth on Internet sales meant that a further security device was needed, and this led to the introduction of a 3 digit check number on the back of the card.

ANS(Prepared by: Mazhar Javed )6 Debit and credit card use This did little to stop card fraud, and the latest security device is the addition of a computer chip that contains encoded information onto credit and debit cards.

ANS(Prepared by: Mazhar Javed )7 Debit and credit card use The ‘chip and pin’ system will prevent some computer fraud, but it is likely that fraudsters are already developing ways to overcome it. The next likely development in debit and credit card protection is to include biometric data (e.g. fingerprint or iris print data) within the chip. As fingerprints and iris print data is unique to an individual, this might prevent most card fraud.

ANS(Prepared by: Mazhar Javed )8 Fraud Fraud means trying to trick someone in order to gain an advantage. Posing as someone from an official organisation such as a bank or electricity company in order to get you to hand over your account details. Creating 'spoof' websites that look like the real thing. For example, making a website that looks exactly like your bank's, then getting you to enter your user name and password so that they can be recorded by the fraudster. Promising a 'get rich quick' scheme if you pay for a pack, which will supposedly contain all of the details that you need. Sending s to get you to give over your personal or account details or getting you to download a data keylogger Stealing your identity in order to pose as you to steal your money or some other criminal activity. Fraud

ANS(Prepared by: Mazhar Javed )9 Credit card Fraud Criminals: obtain credit information from computers holding credit card customer details. Transfer the magnetic strip from a lost or stolen card. Steal cards from owner, or in the post. Get information from credit card receipts and use details to order over the telephone. Unscrupulous businesses swiping the card more than once.

ANS(Prepared by: Mazhar Javed )10 Phantom Withdrawals When the bank customer receives their statement there are withdrawals that they were unaware of. The cardholder or their family may have done some of these withdrawals, some are the result of fraud where a criminal has stolen the details.

ANS(Prepared by: Mazhar Javed )11 Electronic fraud Use of computers to commit fraud for financial gain. Set up false suppliers that trade, when the payments are made the goods are non-existent, and the payments are stolen. Careful recruitment of staff, careful checking of companies to ensure they are legitimate. This is quite common on the Internet where the individual

ANS(Prepared by: Mazhar Javed )12 Software piracy One of the most lucrative examples of computer crime is software piracy. This is the illegal copying of computer programs, and it is very widespread. It is estimated that over 66% of the computer software used in Europe is illegal. Although it does not seem very wrong to ‘steal’ a computer program by copying it, the cost to the computer programmers who have spent time and money developing the software is high. Software piracy is now being treated as a very serious crime, and the penalties can be severe The organisation in the UK responsible for protecting software is FAST (Federation Against Software Theft). They help the police and local trading standards officers to enforce the law.

ANS(Prepared by: Mazhar Javed )13 Copyright, Designs and Patents Act (1989) This makes it a criminal offence to copy or steal software. This includes: –Copying or distributing software or manuals without the permission of the copyright owner (usually the software developer). –Using purchased software covered by copyright on more than one computer unless this is permitted by the software licence. –Encouraging or allowing people to copy or distribute illegal copies of software. A person guilty of an offence under this act may be sent to prison for up to ten years and be fined!

ANS(Prepared by: Mazhar Javed )14 Computer Misuse Act (1990) This act deals with: –Deliberately infecting a computer system with a virus. –Using an employer’s computer to carry out unauthorised work. –Using a computer to commit software piracy. –Using a computer to hack into another computer. –Using a computer to commit a fraud.