Module 2.2 The dangers of computer crime 1
Jan 18, 2016
1
Module 2.2
The dangers of computer crime
2
Module 2.2
The dangers of computer crime
3
Introduction
Techniques and tools used to commit computer
crimes
Categories of computer crime
Protecting yourself against cybercrime
Test and improve your knowledge
Content
4
Computer crime can be seen in two ways –
where a computer system is the target of the crime (e.g. ‘hacking’) and where computer technology is used to enable or commit the crime.
Introduction
5
Any attempt to manipulate or ‘con’ someone intogiving out information such as a password or account number which can be used to impersonate them.
Social engineering
Malware Software specifically designed to install itself without the user’s knowledge and to affect or harm a computer system . This includes viruses and spyware.
6
Techniques and tools used to commit computer crimes
7
It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e‑mail.
Phishing
8
E‑mail spoofing is the forgery of an e‑mail header so that the e‑mail appears to be from a different origin (or person).
Spoofing
9
A computer worm is malware that is able to distribute itself over a network, normally via e‑mail, without a person having run an infected program.
Computer worm
10
Written to disrupt the normal functioning of a person’s computer without their knowledge or consent. Used to turn your computer into a ‘bot’ to spread malware or
to create security loopholes for other programs to exploit.
Computer virus
11
Tries to monitor and track the way you use your computer. It then sends this information to third parties without your consent or knowledge.
Spyware
12
Records your keystrokes as you type and can possibly even record the movements of your mouse and take screenshots of what is displayed on your screen.
Keylogger
13
Type of malware which is a destructive program disguised as a useful application.
Trojan
14
When a computer is ‘hacked’ so that when the user types in a ‘valid’ URL in their browser they are taken to another website, which is often a replica.
Pharming
15
A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the Internet.
Bots
16
Software that downloads onto your computer and bombards your computer with adverts that pop‑up whenever you are connected to the Internet.
Adware
! !
17
Categories of computer crime
18
Harassment
Cyberstalking
Spam
Uploading unauthorised pictures on the Web
Cyberbullying
19
Cyber attacks
business
cyber attacks
website cyber attacks
cyberterrorism
denial of
service attacks
20
Computers and theft Bandwidth
Identity
Processing time and power
Money
Copyrighted material
Data/Intellectual property
21
The criminal either has to:obtain essential information,
such as a user name and password, in order to access a secure system
get physical access to a computer so that data can be downloaded directly onto portable media.
How is the theft carried out?
22
Protecting yourself against cybercrime
23
Assume nothingBelieve no one Check everything
A ‘paranoid ABC’
A B
C
24
Software you need to help protect your computer
Anti-virus software
Computer programs that scan computer files for viruses and eliminate them.
update it regularly
25
Software you need to help protect your computer
Firewall software
Software that allows you to control which programs can access the Internet and
protects your computer or network from unauthorised access.
26
Software you need to help protect your computer
Anti-spyware software
Anti-spyware software detects spyware that has been installed on a computer.
update it regularly
27
Be careful when installing ‘free’ software .
Have good password policies.Stay informed.
Precautions to take
28
Don’t give out personal information.
Don’t click on links in pop‑ups.Don’t open attachments or programs unless you are sure of what they are.
Don’t be gullible.
What NOT to do
29
Test and improve your knowledge
30
Written module activity