cob4 computer crime

Post on 14-Jan-2015

1.507 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Objectives

1.List measures to protect data from unauthorised access

2.List precautions against virus attacks

3.State examples of computer crimes

4.List measures to prevent computer crimes

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

• Some data is important and must be protected

• Computers used more and more

• More data digitalised• Computers being networked• Better accessibility to users …• … and criminals!

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data• Data Espionage: Identity Theft

• In the past, identity data mainly stored in paper or card form• Identity thieves had to be

physically present to steal it• Identity data is now digitally

stored and shared• Theft can be carried out over

connected the Internet!

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data• DoS (Denial-of-Service) Attack

• A massive attack

• Send a flood of data packages to a target system

• Bring systems or entire networks to a stand-still

• Carried out externally using Trojans or backdoor programs

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

• To ensure the security of data transfer• Fix identity of a user

• Unique identification, systems, applications, services and resources

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.2 Theft of Computers• Stealing computers

• Effective way to steal data

• Jacking• Difficult to cut open

secured ATMs• ATMs are located in busy

area• Impossible to cut ATMs

open without attracting attention

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.2 Theft of Computers

• Solutions to theft of computers• Safety doors and alarm

systems

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs

• Programs that are designed with ill intentions

• Types: Viruses, worms and Trojan Horses• A Trojan Horse allows others to

control your computer by creating a “backdoor”

• Names: NetBus and Back Orifice• Can use your computer to attack

other computers.

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs• Precaution against Malicious

Programs• Install anti-virus and update

software

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs• Precaution against Malicious

Programs (Cont’d)• Back up data regularly• If you suspect that your computer

has been infected• Disconnect your computer from

the network and the Internet• Search the Internet with

another computer for solutions to remove the malicious program

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs

1 Identity theft. Encryption.2 Denial-of-Service attack. Install and update anti-

virus programs.3 Programs that are designed with ill intentions.

Anti-virus software, regular data back-ups etc.

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.4 Firewall• A firewall

• A program• Controls

• Access to your computer from the network

• Which programs from your computer can access the network

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 A program that scans your computer and seeks to remove any viruses present. It also stops viruses from being installed and activated.

2 A program that controls access to/ from your computer from/ to the network

4.4 Firewall

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.4 Firewall• A firewall (Cont’d)

• Complements anti-virus software

• Alerts you of possible intrusion

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access• How do you to prevent these situations?

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

• Passwords• Most common form of

protection against unauthorised data access

• BIOS password• Stored on the motherboard• Another layer to the security• Easily bypassed by removing

the BIOS battery

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

• Passwords (Cont’d)• Screensaver

password• Screensaver

activated after a period of inactivity

• A password is needed to resume work

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access• Encryption

• Complements password protection• Encrypt highly confidential data especially• Makes it difficult for anyone to try to read

your data• Important when using the Internet because

your data can be accessible

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 Keep your PC under lock and key. Install safety locks, alarm systems etc.

2 Password, data encryption etc.

4.5 Protecting Your Data from Unauthorised Access

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.6 Hijacked/Misused Internet Accounts

• Prevention measures• Change passwords frequently• Avoid using simple passwords• Do not share passwords

• Internet accounts can be hijacked if others get to know your account name and password

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Computer crimes• Acts performed using computers that• Goes against the laws in a country

• Is the Internet Anonymous?• People act irresponsibly on the

Internet because they thought that nobody knows who they are

• But their identity on the Internet can be traced

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Laws governing computer usage cover the following:• Illegal or offensive material• Child pornography• Criminally racist material• Hacking, cracking and other

computer crimes• Offensive e-mails• Pirated software

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Many international organisations formed to tackle computer crimes

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes• An industry that produces

programs to combat computer crimes has arisen

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• The laws in different countries• Laws governing computer acts

vary among countries• New laws are being enacted to

deal with new situations

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes• Are computer crimes a serious threat?

• Computers are heavily relied upon• By businesses • In many critical areas

• Many disruptions if computers are not in order

• Computer crimes can spread at a very fast rate

• Financial losses from computer crimes are very high

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 Cracking Pirated software Child pornography

2 Heavy reliance on computers for critical functions, Fast proliferation of computer crimes High financial losses

4.7 Computer Crimes

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

1.Security is important because some files contain confidential information. The loss or leakage of information may cause an organisation to lose a lot of money.

2.To prevent PCs from being stolen, we can use a drive lock. Important data can be stored in an external hard disk that is kept away from your PC.

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

3.Viruses, worms and Trojan Horses are types of malicious programs.

4.To protect against malicious viruses, install anti-virus programs. Also, back up important data regularly. A firewall can also help to detect viruses that might have escaped detection by the anti-virus software.

5.To prevent physical unauthorised access, use passwords such as a BIOS password and a screensaver password.

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

6.Hacking and cracking are examples of computer crime. Crackers gain unauthorised access to a computer network to view, steal and even delete files.

7.To prevent unauthorised access from the Internet, use a firewall.

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

8.Apart from bringing convenience such as Internet banking and e-commerce, the Internet has become a tool for crime.

9.We should be careful when giving out personal information, including credit card information, logins and passwords. Change passwords frequently and do not share passwords.

top related