Top Banner
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
23

Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Dec 16, 2015

Download

Documents

Bonnie Dalton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Created by: Robert McAndrewsCareer & Technology Education

Humble Independent School District.

Page 2: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.

Computer crime can be defined as criminal activity involving computer information technology systems.

--Wikipedia

Page 3: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

illegal access (unauthorized access) illegal interception (by technical means of non-

public transmissions of computer data to, from or within a computer system)

data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data)

systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data)

misuse of devices forgery (ID theft) and electronic fraud

Wikipedia

Page 4: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

An acceptable use policy (AUP; also sometimes acceptable usage policy) is a set of rules applied by network and website owners which restrict the ways in which the network or site may be used. AUP documents are written for corporations, businesses, universities, schools, and website owners often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.

Wikipedia

Page 5: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

http://tlo2.tlc.state.tx.us/statutes/pe.toc.htm

PENAL CODE CHAPTER 33. COMPUTER CRIMES

What is Penal Code?penal code n. A body of laws relating to crimes and offenses and the penalties for their commission.

Page 6: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Computer Security is used often to describe keeping computer programs and data safe from being damaged or stolen.

There is not much risk unless the computer is connected to a network such as the Internet.

Page 7: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Your home computer is a popular target for intruders.

Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find.

By stealing that information, intruders can use your money to buy themselves goods and services.

Page 8: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings.

Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks.

Page 9: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

People with the will and intent to do harmare often referred to as "crackers"--as in "cracking" into computers.

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Page 10: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Unauthorized use◦Using a computer system

without permission Hacking or Cracking

◦Breaking into computer systems for fun or to damage information.

Sabotage and blackmail◦Breaking into system to fraud or steal

Page 11: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Piggybacking◦ Internet access without paying

Zapping Data diddling Scavenging Hardware theft

◦ Laptop/notebook computers Software piracy or theft

◦ Federal Crime Information theft

◦ Intellectual property

Page 12: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Piggybacking is a term used to refer to obtaining a wireless internet connection by bringing one's own computer within the range of another's wireless connection without that subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice.

To get a free ride

Page 13: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

When a bug is detected after the software is released, the only way to fix the already compiled code is to overlay the imperfect or buggy code with a sequence of corrected code. This overlaying is known as zapping (verb) and the fix itself is a zap.

In generic computing, to zap (verb) can also mean to erase or get rid of something.

http://www.csgnetwork.com/glossary.html

Page 14: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.

http://www.nrps.com/community/comprev.asp

Page 15: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Unauthorized access to information left on discarded media.

Going through the garbage to obtain valuable information that can be used to gain access and/or steal.

Dumpster Diving.

Page 16: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Stealing a computer or peripheral device such as: keyboard, mouse, printer

Software theft The unauthorized and illegal copying of

copyrighted software Also known as software piracy or

information theft.

Page 17: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Passwords◦ Remembered Information

Possessed Objects◦ Badges, cards, keys

Biometric Devices◦ Fingerprint, signature◦ eye or voice patterns

Page 18: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Encryptions Backup Procedures Surge Protector

◦ To Prevent System Failures

Page 19: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

A potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which it comes in contact with.

Illegal computercode that can dosuch things as alterprograms and/ordestroy data.

Page 20: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Worm Worm Program Time bomb Logic bomb Trojan horse Virus hoax

Page 21: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Computer or software that has been attacked and to which the virus has attached itself

A virus can be spread byan external storage devicesuch as a diskette.

Viruses can be spread bydownloading from theInternet.

Page 22: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Install an Anti-Virus Program also known as vaccines.

Scan Storage Devices before using them◦ Disks, CD’s/DVD’s, Flash Drives

Double Check all Downloaded Files from Internet

Do Not Download if source is unknown

Page 23: Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

The term white hat is used for a person who is ethically opposed to the abuse of computer systems.

A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent.