cob4 computer crime

33
Computer Crimes C O B : C O M P U T E R S B A S I C S COB 4 Objectives 1.List measures to protect data from unauthorised access 2.List precautions against virus attacks 3.State examples of computer crimes 4.List measures to prevent

Upload: angbeelee

Post on 14-Jan-2015

1.507 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Objectives

1.List measures to protect data from unauthorised access

2.List precautions against virus attacks

3.State examples of computer crimes

4.List measures to prevent computer crimes

Page 2: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

• Some data is important and must be protected

• Computers used more and more

• More data digitalised• Computers being networked• Better accessibility to users …• … and criminals!

Page 3: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data• Data Espionage: Identity Theft

• In the past, identity data mainly stored in paper or card form• Identity thieves had to be

physically present to steal it• Identity data is now digitally

stored and shared• Theft can be carried out over

connected the Internet!

Page 4: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data• DoS (Denial-of-Service) Attack

• A massive attack

• Send a flood of data packages to a target system

• Bring systems or entire networks to a stand-still

• Carried out externally using Trojans or backdoor programs

Page 5: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

Page 6: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.1 Protecting Data

• To ensure the security of data transfer• Fix identity of a user

• Unique identification, systems, applications, services and resources

Page 7: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.2 Theft of Computers• Stealing computers

• Effective way to steal data

• Jacking• Difficult to cut open

secured ATMs• ATMs are located in busy

area• Impossible to cut ATMs

open without attracting attention

Page 8: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.2 Theft of Computers

• Solutions to theft of computers• Safety doors and alarm

systems

Page 9: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs

• Programs that are designed with ill intentions

• Types: Viruses, worms and Trojan Horses• A Trojan Horse allows others to

control your computer by creating a “backdoor”

• Names: NetBus and Back Orifice• Can use your computer to attack

other computers.

Page 10: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs• Precaution against Malicious

Programs• Install anti-virus and update

software

Page 11: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs• Precaution against Malicious

Programs (Cont’d)• Back up data regularly• If you suspect that your computer

has been infected• Disconnect your computer from

the network and the Internet• Search the Internet with

another computer for solutions to remove the malicious program

Page 12: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.3 Malicious Programs

1 Identity theft. Encryption.2 Denial-of-Service attack. Install and update anti-

virus programs.3 Programs that are designed with ill intentions.

Anti-virus software, regular data back-ups etc.

Page 13: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.4 Firewall• A firewall

• A program• Controls

• Access to your computer from the network

• Which programs from your computer can access the network

Page 14: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 A program that scans your computer and seeks to remove any viruses present. It also stops viruses from being installed and activated.

2 A program that controls access to/ from your computer from/ to the network

4.4 Firewall

Page 15: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.4 Firewall• A firewall (Cont’d)

• Complements anti-virus software

• Alerts you of possible intrusion

Page 16: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access• How do you to prevent these situations?

Page 17: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

• Passwords• Most common form of

protection against unauthorised data access

• BIOS password• Stored on the motherboard• Another layer to the security• Easily bypassed by removing

the BIOS battery

Page 18: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

Page 19: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access

• Passwords (Cont’d)• Screensaver

password• Screensaver

activated after a period of inactivity

• A password is needed to resume work

Page 20: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.5 Protecting Your Data from Unauthorised Access• Encryption

• Complements password protection• Encrypt highly confidential data especially• Makes it difficult for anyone to try to read

your data• Important when using the Internet because

your data can be accessible

Page 21: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 Keep your PC under lock and key. Install safety locks, alarm systems etc.

2 Password, data encryption etc.

4.5 Protecting Your Data from Unauthorised Access

Page 22: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.6 Hijacked/Misused Internet Accounts

• Prevention measures• Change passwords frequently• Avoid using simple passwords• Do not share passwords

• Internet accounts can be hijacked if others get to know your account name and password

Page 23: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Computer crimes• Acts performed using computers that• Goes against the laws in a country

• Is the Internet Anonymous?• People act irresponsibly on the

Internet because they thought that nobody knows who they are

• But their identity on the Internet can be traced

Page 24: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Laws governing computer usage cover the following:• Illegal or offensive material• Child pornography• Criminally racist material• Hacking, cracking and other

computer crimes• Offensive e-mails• Pirated software

Page 25: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• Many international organisations formed to tackle computer crimes

Page 26: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes• An industry that produces

programs to combat computer crimes has arisen

Page 27: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes

• The laws in different countries• Laws governing computer acts

vary among countries• New laws are being enacted to

deal with new situations

Page 28: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

4.7 Computer Crimes• Are computer crimes a serious threat?

• Computers are heavily relied upon• By businesses • In many critical areas

• Many disruptions if computers are not in order

• Computer crimes can spread at a very fast rate

• Financial losses from computer crimes are very high

Page 29: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

1 Cracking Pirated software Child pornography

2 Heavy reliance on computers for critical functions, Fast proliferation of computer crimes High financial losses

4.7 Computer Crimes

Page 30: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

1.Security is important because some files contain confidential information. The loss or leakage of information may cause an organisation to lose a lot of money.

2.To prevent PCs from being stolen, we can use a drive lock. Important data can be stored in an external hard disk that is kept away from your PC.

Page 31: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

3.Viruses, worms and Trojan Horses are types of malicious programs.

4.To protect against malicious viruses, install anti-virus programs. Also, back up important data regularly. A firewall can also help to detect viruses that might have escaped detection by the anti-virus software.

5.To prevent physical unauthorised access, use passwords such as a BIOS password and a screensaver password.

Page 32: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

6.Hacking and cracking are examples of computer crime. Crackers gain unauthorised access to a computer network to view, steal and even delete files.

7.To prevent unauthorised access from the Internet, use a firewall.

Page 33: COB4 Computer Crime

Computer CrimesComputer Crimes

C O B : C O M P U T E R S B A S I C S

COB 4

Summary

8.Apart from bringing convenience such as Internet banking and e-commerce, the Internet has become a tool for crime.

9.We should be careful when giving out personal information, including credit card information, logins and passwords. Change passwords frequently and do not share passwords.