C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Security, Privacy, and Ethics Online Computer Crimes.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Cyber crime & Security Prepared by : Rughani Zarana.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Crime & Malpractice AS Module Heathcote Ch. 10.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
For more notes and topics visit: eITnotes.com.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Computer Security Threats
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Presentation transcript:

C OMPUTER C RIMES

“Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.” - The American Heritage® Dictionary of the English Language: Fourth Edition “This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.” - Wikipedia

F ORMS OF C OMPUTER C RIME Theft of Hardware Eg: shoplifting of accessory or taking the whole system unit Theft of Software Software Piracy – unauthorized copying of programs for personal gain Act of using software without the appropriate license RA8293 (Intellectual Property Code of the Phils) declares that computer programs are copyrightable Penalty: 1-3 yrs imprisonment plus fine ranging from P50, ,000 for the 1 st offense

F ORMS OF C OMPUTER C RIME Theft of Time and Services Eg: Using computer for non-work related things Theft of Information Eg: stealing/selling of personal information (Identity Theft) Crimes of Malice and Destruction Perpetrators are more interested in abusing or vandalizing computer systems Eg: defacing web sites

T YPES O F C OMPUTER C RIME Theft. Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information. It is well known that laptop computers are targeted at airports and restaurants. The prize garnered with theft of a laptop is usually the data or information such as passwords for corporate systems contained on the laptops rather than the hardware. Fraud. Fraud on the Internet may run the gamut from credit card offers which are utilized only to capture personal information, to investor postings which promote a stock or investment offer to encourage investment which will benefit the person posting the information, to medical and pharmaceutical -related sites which purport to provide correct medical advice or sell altered medications. Copyright infringement. The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased). Software piracy occurs more easily with the ability to post files for downloading all over the world.

V IRUSES A virus is a segment of program code that implants itself to one of the executable files and spreads systematically from one file to another. A virus can only spread from one computer to another when its host is taken to the uninfected computer Functions: Spreads itself from one file to another without the user’s input or knowledge ( Self-replication and Propagation ) Implements the symptom or damage planned by the perpetrator ( Virus Payload ) Include erasing a disk, corrupting programs, create havoc

S OME C ATEGORIES OF V IRUSES Boot Sector Viruses Boot Sector – part of the system software that contains most of the instructions for booting up the system. Most hostile type; replaces the boot instructions & loads the virus into main memory before the OS thereby infecting other disks that come in contact with it File-Infecting Viruses Attaches itself to executable files that actually begin a program Worms Programs that spreads by replicating itself and clogs the system with copies of itself Commonly spread via message attachments Bombs Hides in a user’s disk and waits for a specific event to occur before running

S OME C ATEGORIES OF V IRUSES Trojan Horses any program that presents itself as performing one task while actually performing another that causes damage. Usually downloaded from the Internet at a valid and useful program (eg: wallpaper changer). After being run by the user, it can destroy files or replace some other program Stealth Viruses Resides in computer memory making detection difficult Can conceal the damage it created from the user and the OS Viruses Transmitted as an attachment to an message

H OW TO P ROTECT Y OUR C OMPUTERS FROM V IRUSES ? Avoid high risk sources Most often found on public domain software or from pirated copies of commercial software. Eg. Metacafe, Utorrent and Bittorent Use a virus detection software Before running/opening any file especially those from high risk sources, check the source using a virus detection software Regularly update your virus definitions for the software to be effective Conduct regular virus scan of your computer system Eg: Norton Anti-Virus, Kaspersky, Avira, AVG and etc.

W HAT IF A V IRUS IS D ETECTED ? For networked systems, immediately inform the network administrator or any personnel from the MIS or Systems Administrator- Jun Alcantara For personal systems: Use the disinfect/clean function of the virus detection software Erase the infected file

C OMPUTER C RIMINALS Employees They commit 80% of the crimes ranging from stealing SW, HW & other peripherals, computer fraud, proprietary information & time Greatest threat from disgruntled employees. Outside Users Clients & other entities who do business with a company can gain access to info & use it to commit crimes. Hackers and Crackers Hackers – people who gain unauthorized access to computer system for fun & challenge Crackers – people who gain unauthorized access for malicious purposes (for financial gain or to destroy data). Organized Crime Use computers for illegal activities such as counterfeiting.