ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Part I: Making Good Online Choices
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Opening a bank account.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
EFFECTS & USES OF ICT.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Protecting Your Identity While Attending College.
Cyber Crimes.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Unethical use of Computers and Networks
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
By Liam Wright Manga comic group Japan SAFETY on your computer.
You. are at risk for the fastest growing crimes crime.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technical Implementation: Security Risks
Identity Theft It’s a crime!
ICT & Crime Introduction.
Lesson 2- Protecting Yourself Online
Lesson 2- Protecting Yourself Online
Presentation transcript:

ICT & Crime Introduction

Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing the stories. ict.com/news/news_stories/news_crime.htm Due in Friday These will be put on a display, so make sure you do a good job

Activity 1 (5 minutes) Computers have changed many of the ways we do things over the past 30 years. But overall, is this a good thing, or a bad thing? Computers are commonly used to do things that are dangerous, repetitive, or which need a very high degree of accuracy. In groups, write down as many jobs as you can in these three categories which are done by or with computers. Don’t just think about things like traffic lights – think about office jobs and communications, too

Introduction Where there are ways to make money, there will be criminals just waiting to take advantage.The growth of the Internet has provided criminals with a whole host of new and different opportunities to commit crime. Computer crime is defined as 'criminal activity directly related to the use of computers'. It could be done in order to: 1.steal money 2.steal data or information 3.steal someone's identity 4.damage or disrupt someone's system for revenge 5.cause general havoc for fun 6.copy software / films / music to avoid paying for it.

Using ICT to steal money Most internet purchases are paid for by credit card. How do thieves obtain credit card details? –Intercepting transactions –Insecure websites –Fraudulent websites –Till receipts –Card-cloning

Prevention –Secure websites ( –Not printing full card number on till receipts etc –Verifying billing address details with bank databases –Individual card-readers/TANs (Transaction Authentication Number)

Activity 2: in pairs (10 minutes) Find out the definition of one of the following and present it to the class: –Classic TAN –Indexed TAN –Indexed TAN with CAPTCHA (iTAN) –Mobile TAN (mTAN) –TAN generator

Classic Tan The bank creates a list of 50 of unique TANs for the user - each TAN is six or eight characters long. The user picks up the list from their bank. To make a transaction, the user enters the request and authorizes the transaction by entering an unused TAN. The bank verifies the TAN submitted against the list of TANs they issued to the user. If it is a match, the transaction is processed. If it is not a match, the transaction is rejected. The TAN has now been consumed and will not be recognized for any further transactions. If the TAN list is compromised, the user may cancel it by notifying the bank. BUT – no protection against phishing or against “man in the middle” attacks

Classic TANs

Indexed TAN (iTAN) Indexed TANs reduce the risk of phishing. To authorize a transaction, the user is not asked to use any TAN from the list, but to enter a specific TAN identified by a number (eg TAN number 11). The index is randomly chosen by the bank, so an arbitrary TAN acquired by an attacker is usually worthless. BUT iTANs are still susceptible to man-in-the- middle attacks, including phishing attacks where the attacker tricks the user into logging in into a forged copy of the bank's website.

Indexed TAN with CAPTCHA (iTANplus) adds a CAPTCHA to reduce the risk of man-in-the-middle attacks.[Prior to entering the iTAN, the user is presented a CAPTCHA, which in the background also shows the transaction data and data deemed unknown to a potential attacker, such as the user's birthdate. This is intended to make it hard (but not impossible) for an attacker to forge the CAPTCHA.[

Indexed TAN with CAPTCHA

Mobile TAN mTANs are used by banks in Germany, Austria, Poland, the Netherlands, Hungary and South Africa. When the user initiates a transaction, a TAN is generated by the bank and sent to the user's mobile phone by SMS. BUT the security of this scheme depends on the security of the mobile phone system –SIM cloning –Mobile phone viruses

TAN Generators These generate an individual TAN “on the fly” for each transaction, suing an algorithm known only to the bank, so there is no risk of a TAN list getting lost in the mail or being compromised in another way. BUT no defence against man-in-the- middle attacks, or phishing/fraudulent websites

Other ways of stealing money The rise of online banking means that it isn’t just shopping that can be dangerous. Paying bills online can cost much more than just the price of the bill. –Interception of details –Phishing

Online banking & prevention of theft Step 1: Customer number (user name)

Step 2 Security number: a 4-digit number known only to the user & the bank User is asked to enter 3 random digits from this number in a random order Hacker cannot get entire number/digits in the right order

Step 3 Random characters from password Hacker/keylogger cannot get entire password

Phishing This is where a user is tricked into entering their user name & password to a fake website. The website looks like the bank/ebay/paypal website, but belongs to a hacker.

Plenary (5 minutes)

Answer Computer crime, otherwise known as 'cyber crime' is using a computer to steal, embezzle or defraud people or businesses.