This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Slide 1
Slide 2
Security, Privacy, and Ethics Online Computer Crimes
Slide 3
Objective Given instructions, the learner will discuss the
network and web security with 85% accuracy.
Slide 4
Computer Crimes It is a criminal act committed through the use
of a computer.
Slide 5
Types of Computer Crimes Unauthorized use of a computer
Infection of a computer by a malicious program (a virus) Harassment
and stalking on the computer Theft of computer equipment Copyright
violations of a software Copyright violations of information found
on the internet (Sharing Copyright Music or MP3s)
Slide 6
Computer Fraud Is conduct that involves the manipulation of a
computer or computer data in order to obtain money, property, or
value dishonestly or to cause loss. Examples of computer fraud
include stealing money from bank accounts and stealing information
from other peoples computer for gain.
Slide 7
Signs of Computer Fraud Low staff moral: Unhappy staff members
may decide the company owes them. Unusual work patterns. Staff
members who appear to be living beyond their income.
Slide 8
Computer Hacking It involves invading someone elses computer.
Usually for personal gain or just the satisfaction of invading
someone elses computer. Hackers are usually computer experts who
enjoy having the power to invade someone elses privacy. They can
steal money, or change or damage data stored on a computer
Slide 9
Computer Virus A program that has been written usually by a
hacker, to cause corruption of data on a computer. The virus is
attached to an executable file (like a program file) and spreads
from one file to another once the program to executed
Slide 10
Types of Virus Worm Time Bomb Logic Bomb Trojan Horse
Slide 11
Worm A worm makes copies of itself, resulting in the
consumption of system resources that slows down or actually halts
task. Worms dont know to attach themselves to other files.
Slide 12
Time Bomb A time bomb is virus that does not cause its damage
until a certain date or until the system has been booted a certain
number of times.
Slide 13
Logic Bomb A logic bomb is a virus triggered by the appearance
or disappearance of specified data.
Slide 14
Trojan Horse A Trojan horse is a virus that does something
different from what that is expected to do. It may look like it is
doing one thing while in actuality it is doing something quite
opposite (usually something disastrous)
Slide 15
Protect Your Computer From Viruses Use antivirus software. This
software should always run on your computer and should be updated
regularly. Be careful in opening e-mail attachments. It is a good
idea to save them to disk before reading them so you can scan them.
Dont access files copied from floppy disks or downloaded from the
Internet without scanning them first.
Slide 16
Software Piracy The illegal copying or use of computer
programs. Software Programs come with a license number or key that
are used to install the program correctly to register it with the
company online before you can use the program. FREEWARE Software
that is offered online at no cost is call FREEWARE. SHAREWARE
SHAREWARE is also available on the internet at no cost to use for a
trial period, but then the developer expects to be paid a fee for
the software, which may have taken many hours of programming to
develop.
Slide 17
Other Computer Crimes Theft of Computer Time Theft of Computer
Time This crime is committed when an employee uses a companys
computer for personal use such as running a small side business,
keeping personal records. Theft of output Theft of output Using
information you see on someones elses screen or printout to profit
unfairly. Data Diddling Data Diddling is changing data before it is
entered into the computer or after it has been entered into the
computer
Slide 18
Post Qs? What is Computer Crimes? It is a criminal act
committed through the use of a computer. What is Computer Fraud? Is
conduct that involves the manipulation of a computer or computer
data in order to obtain money, property, or value dishonestly or to
cause loss. Name one sign of computer fraud in a company. Low staff
moral, Unusual work patterns, and living beyond their income What
is a Hacker? It involves invading someone elses computer. What is a
Computer Virus? A program that has been written usually by a
hacker, to cause corruption of data on a computer. Name four types
of Virus. Worm, Time bomb, Logic bomb, Trojan horse Name one other
computer crime. Theft of Computer time and Theft of output
Slide 19
SECURITY ISSUES Computer Security
Slide 20
Objective Given instructions, the learner will discuss the
network and web security with 85% accuracy.
Slide 21
Computer Security Computer security is necessary in order to
keep hardware, software, and data safe from harm or destruction.
The best way to protect data it to effectively control the access
to it. Passwords The most common form of restricting access to data
is the use of Passwords (Password are used to protect data against
unauthorized users).
Slide 22
Other Security Measures Electronic identification cards are
used to gain access to certain areas within a building or
department. Firewalls, which consist of special hardware a
software, protect individual companies network form external
networks. Antivirus software are used to protect data on your
computer.
Slide 23
Other Security Measures for Companies Institute a very
selective hiring process that includes careful screening of
potential employee. Regularly back up data and store it offsite.
Biometrical Security Measures Employ Biometrical Security Measures,
which examine a fingerprint, a voice pattern, or the iris or retina
of the eye.
Slide 24
Cookies Small files that are created when you visit a Website
and are stored on your computer, then accessed again the next time
you visit the site. It makes it easier for you to use the website
when you return and it also provides the Web owner with
information.
Slide 25
Spyware A program installed on your computer without your
knowledge, usually when you download a file. Spyware tracks your
Web habits and take control over your computer and direct you to
websites. Spyware can be harmful as well as annoying; firewalls
consisting of hardware and software features can protect your
computer from unauthorized spyware programs.
Slide 26
Piracy Piracy is a theft of intellectual property.
Slide 27
Laws that Protects Users The Copyright Act of 1976: The
Copyright Act of 1976: Protects the developer of software. Software
Piracy and Counterfeiting Amendment Software Piracy and
Counterfeiting Amendment Electronic Communication Piracy Act, 1986:
Electronic Communication Piracy Act, 1986: Prohibits the
interception of data communication Computer Fraud and Abuse Act,
1986: Computer Fraud and Abuse Act, 1986: Prohibits individuals
without authorization from knowingly accessing a company computer
to obtain records from financial communication. Computer Matching
& Privacy Protection Act, 1988: Computer Matching & Privacy
Protection Act, 1988: Regulates how federal data can be used to
determine whether an individual is entitled to federal benefits.
Many states also have laws governing computer crimes.
Slide 28
The Golden Rule Do unto others as you would have them do unto
you!
Slide 29
Post Qs? Why is computer security necessary? Computer security
is necessary in order to keep hardware, software, and data safe
form harm or destruction? Name a law that has been passed to
protect your computer? 1) Copyright Act of 1976, 2) Software Piracy
and Counterfeiting Amendment of 1983, 3) Electronic Commission
Privacy Act, 1986, 4) Computer Fraud and Abuse Act, 1986, and 5)
Computer Matching & Privacy Protection Act, 1988 What is
cookies? Small files that are created when you visit a Website and
are stored on your computer, then accessed again the next time you
visit the site. What is Piracy? Piracy is a theft of intellectual
property. What is spyware? A program installed on your computer
without your knowledge, usually when you download a file.