Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.

Similar presentations


Presentation on theme: "Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the."— Presentation transcript:

1 Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

2 Types of Computer Crimes Computer fraudComputer fraud –Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Computer hackingComputer hacking –Involves invading someone elses computer, usually for personal gain or just the satisfaction of invasion. Hacker – A person who secretly gains access to computers and files without permission.Hacker – A person who secretly gains access to computers and files without permission.

3 Other Computer Crimes Theft of computer timeTheft of computer time –An employee uses a companys computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. Data diddlingData diddling –Changing data before it is entered into the computer or after is has been entered into the computer.

4 Computer Viruses Virus - a program that has been written to cause corruption of data on a computer.Virus - a program that has been written to cause corruption of data on a computer. Hoax – A program that is intended to scare users into thinking they have a virus. No Virus is attached.Hoax – A program that is intended to scare users into thinking they have a virus. No Virus is attached.

5 Types of Computer Viruses WormWorm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. It will bore its way through a computers files or go through a computer network.Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. It will bore its way through a computers files or go through a computer network. Time bombTime bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. Logic bombLogic bomb Virus triggered by the appearance or disappearance of specified data.Virus triggered by the appearance or disappearance of specified data. Trojan horseTrojan horse Virus that does something different from what it is expected to do.Virus that does something different from what it is expected to do.

6 Privacy and Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.

7 Security Measures Maintain and Enforce Security Measures such as: Passwords (A safeguard for access to a computer or computer program)Passwords (A safeguard for access to a computer or computer program) Electronic identification cardsElectronic identification cards FirewallsFirewalls Antivirus software (program) - (A computer program that detects viruses and repairs files.)Antivirus software (program) - (A computer program that detects viruses and repairs files.) Selective hiring processSelective hiring process

8 Safe Computing Make back-up copies of all files on a regular basis.Make back-up copies of all files on a regular basis. Dont share disks from other computers – this increases your chance of catching a virus.Dont share disks from other computers – this increases your chance of catching a virus. Dont boot from a floppy disk.Dont boot from a floppy disk. Write-protect your disks.Write-protect your disks.

9 Safe Computing Use an anti-virus program to scan your files on a regular basis.Use an anti-virus program to scan your files on a regular basis. Use caution when downloading files from the Internet – many are virus infected.Use caution when downloading files from the Internet – many are virus infected. File sharing on a Local Area Network (LAN) may also expose your files to a virus.File sharing on a Local Area Network (LAN) may also expose your files to a virus.

10 Software Usage Commercial Software – copyrighted by an individual or a business. Permission needed in order to copy.Commercial Software – copyrighted by an individual or a business. Permission needed in order to copy. Shareware – copyrighted protected. Distributed free on a trial basis. Payment by the honor system for satisfied users.Shareware – copyrighted protected. Distributed free on a trial basis. Payment by the honor system for satisfied users. Freeware – Given away free of charge. Owner often retains rights. Not necessarily free to copy and distribute.Freeware – Given away free of charge. Owner often retains rights. Not necessarily free to copy and distribute. Public-Domain Software – Not copyrighted. Donated for public use. Free to copy and distribute.Public-Domain Software – Not copyrighted. Donated for public use. Free to copy and distribute.

11 Ethics Ethical – conforming to the accepted professional standards of conduct.Ethical – conforming to the accepted professional standards of conduct. Copyright – Protection giving the owner the exclusive right to reproduce or distribute copies of his or her work.Copyright – Protection giving the owner the exclusive right to reproduce or distribute copies of his or her work. License – Tells you what you can and cannot do with a program.License – Tells you what you can and cannot do with a program. Software piracy – illegal copying and distribution of software programs.Software piracy – illegal copying and distribution of software programs. SPA (Software Publishers Association) – group that investigates software copyright violations.SPA (Software Publishers Association) – group that investigates software copyright violations. Intellectual Property – ideas put into action, like writing, music, art, computer programs.Intellectual Property – ideas put into action, like writing, music, art, computer programs.


Download ppt "Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the."

Similar presentations


Ads by Google