• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
COB4 Computer Crime

COB4 Computer Crime






Total Views
Views on SlideShare
Embed Views



1 Embed 645

http://bvss.mycybersphere.net 645



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    COB4 Computer Crime COB4 Computer Crime Presentation Transcript

    • Objectives
      • List measures to protect data from unauthorised access
      • List precautions against virus attacks
      • State examples of computer crimes
      • List measures to prevent computer crimes
    • 4.1 Protecting Data
      • Some data is important and must be protected
      • Computers used more and more
      • More data digitalised
      • Computers being networked
      • Better accessibility to users …
      • … and criminals!
    • 4.1 Protecting Data
      • Data Espionage: Identity Theft
        • In the past, identity data mainly stored in paper or card form
          • Identity thieves had to be physically present to steal it
        • Identity data is now digitally stored and shared
          • Theft can be carried out over connected the Internet!
    • 4.1 Protecting Data
      • DoS (Denial-of-Service) Attack
        • A massive attack
          • Send a flood of data packages to a target system
          • Bring systems or entire networks to a stand-still
        • Carried out externally using Trojans or backdoor programs
    • 4.1 Protecting Data
    • 4.1 Protecting Data
      • To ensure the security of data transfer
        • Fix identity of a user
          • Unique identification, systems, applications, services and resources
    • 4.2 Theft of Computers
      • Stealing computers
        • Effective way to steal data
      • Jacking
        • Difficult to cut open secured ATMs
        • ATMs are located in busy area
        • Impossible to cut ATMs open without attracting attention
    • 4.2 Theft of Computers
      • Solutions to theft of computers
        • Safety doors and alarm systems
    • 4.3 Malicious Programs
      • Programs that are designed with ill intentions
      • Types: Viruses, worms and Trojan Horses
        • A Trojan Horse allows others to control your computer by creating a “backdoor”
        • Names: NetBus and Back Orifice
        • Can use your computer to attack other computers.
    • 4.3 Malicious Programs
      • Precaution against Malicious Programs
        • Install anti-virus and update software
    • 4.3 Malicious Programs
      • Precaution against Malicious Programs (Cont’d)
        • Back up data regularly
        • If you suspect that your computer has been infected
          • Disconnect your computer from the network and the Internet
          • Search the Internet with another computer for solutions to remove the malicious program
    • 4.3 Malicious Programs
      • Identity theft. Encryption.
      • Denial-of-Service attack. Install and update anti-virus programs.
      • Programs that are designed with ill intentions. Anti-virus software, regular data back-ups etc.
    • 4.4 Firewall
      • A firewall
        • A program
        • Controls
          • Access to your computer from the network
          • Which programs from your computer can access the network
      • A program that scans your computer and seeks to remove any viruses present. It also stops viruses from being installed and activated.
      • A program that controls access to/ from your computer from/ to the network
      4.4 Firewall
    • 4.4 Firewall
      • A firewall (Cont’d)
        • Complements anti-virus software
        • Alerts you of possible intrusion
    • 4.5 Protecting Your Data from Unauthorised Access
      • How do you to prevent these situations?
    • 4.5 Protecting Your Data from Unauthorised Access
      • Passwords
        • Most common form of protection against unauthorised data access
        • BIOS password
          • Stored on the motherboard
          • Another layer to the security
          • Easily bypassed by removing the BIOS battery
    • 4.5 Protecting Your Data from Unauthorised Access
    • 4.5 Protecting Your Data from Unauthorised Access
      • Passwords (Cont’d)
        • Screensaver password
          • Screensaver activated after a period of inactivity
          • A password is needed to resume work
    • 4.5 Protecting Your Data from Unauthorised Access
      • Encryption
        • Complements password protection
        • Encrypt highly confidential data especially
        • Makes it difficult for anyone to try to read your data
        • Important when using the Internet because your data can be accessible
      • Keep your PC under lock and key. Install safety locks, alarm systems etc.
      • Password, data encryption etc.
      4.5 Protecting Your Data from Unauthorised Access
    • 4.6 Hijacked/Misused Internet Accounts
      • Prevention measures
        • Change passwords frequently
        • Avoid using simple passwords
        • Do not share passwords
      • Internet accounts can be hijacked if others get to know your account name and password
    • 4.7 Computer Crimes
      • Computer crimes
        • Acts performed using computers that
        • Goes against the laws in a country
      • Is the Internet Anonymous?
        • People act irresponsibly on the Internet because they thought that nobody knows who they are
        • But their identity on the Internet can be traced
    • 4.7 Computer Crimes
      • Laws governing computer usage cover the following:
        • Illegal or offensive material
        • Child pornography
        • Criminally racist material
        • Hacking, cracking and other computer crimes
        • Offensive e-mails
        • Pirated software
    • 4.7 Computer Crimes
      • Many international organisations formed to tackle computer crimes
    • 4.7 Computer Crimes
      • An industry that produces programs to combat computer crimes has arisen
    • 4.7 Computer Crimes
      • The laws in different countries
        • Laws governing computer acts vary among countries
        • New laws are being enacted to deal with new situations
    • 4.7 Computer Crimes
      • Are computer crimes a serious threat?
        • Computers are heavily relied upon
          • By businesses
          • In many critical areas
            • Many disruptions if computers are not in order
        • Computer crimes can spread at a very fast rate
        • Financial losses from computer crimes are very high
      •  Cracking
      •  Pirated software
      •  Child pornography
      • 2  Heavy reliance on computers for critical functions,
      •  Fast proliferation of computer crimes
      •  High financial losses
      4.7 Computer Crimes
    • Summary
      • Security is important because some files contain confidential information. The loss or leakage of information may cause an organisation to lose a lot of money.
      • To prevent PCs from being stolen, we can use a drive lock. Important data can be stored in an external hard disk that is kept away from your PC.
    • Summary
      • Viruses, worms and Trojan Horses are types of malicious programs.
      • 4.To protect against malicious viruses, install anti-virus programs. Also, back up important data regularly. A firewall can also help to detect viruses that might have escaped detection by the anti-virus software.
      • 5. To prevent physical unauthorised access, use passwords such as a BIOS password and a screensaver password.
    • Summary
      • Hacking and cracking are examples of computer crime. Crackers gain unauthorised access to a computer network to view, steal and even delete files.
      • To prevent unauthorised access from the Internet, use a firewall.
    • Summary
      • Apart from bringing convenience such as Internet banking and e-commerce, the Internet has become a tool for crime.
      • We should be careful when giving out personal information, including credit card information, logins and passwords. Change passwords frequently and do not share passwords.