Forensic Science Informatics Unit 37
Forensic Science Informatics <ul><li>P3 describe crimes committed using the Internet </li></ul>
Task 1 <ul><li>List crimes committed using the Internet </li></ul><ul><li>Choose  five  of the crimes and describe them. (...
Computer crimes
Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is policed (M3) </li></ul>
Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain  how the Internet is policed </li></ul>
Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the  Internet  is policed </li></ul>
Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is  policed </li></ul>
Explain <ul><li>Make plain and comprehensible </li></ul><ul><li>Requires details, examples and description </li></ul><ul><...
Internet <ul><li>Internet </li></ul><ul><li>World Wide Web </li></ul>
“ Policed” <ul><li>I keep six honest serving-men (They taught me all I knew); Their names are  What  and  Why  and  When  ...
Key questions <ul><li>What </li></ul><ul><li>Why </li></ul><ul><li>When </li></ul><ul><li>How </li></ul><ul><li>Where </li...
Key questions <ul><li>What  is policing the Internet? </li></ul><ul><li>Why  do we police the Internet? </li></ul><ul><li>...
Key questions <ul><li>What  is policing the Internet? </li></ul><ul><li>Why  do we police the Internet? </li></ul><ul><li>...
Key questions <ul><li>What  is policing the Internet? </li></ul><ul><li>Why  do we police the Internet? </li></ul><ul><li>...
Key questions <ul><li>What  is policing the Internet? </li></ul><ul><li>Why  do we police the Internet? </li></ul><ul><li>...
Task 3 <ul><li>Evaluate the methods used for policing the Internet (D3) </li></ul>
Task 3 <ul><li>Evaluate  the methods used for policing the Internet (D3) </li></ul>
Evaluate <ul><li>Evaluate  the methods used for policing the Internet (D3) </li></ul><ul><li>What are the strengths and we...
Personal policing <ul><li>Secure browser </li></ul><ul><li>Secure passwords – changed regularly </li></ul><ul><li>Social n...
Social networking sites & messaging <ul><li>Again secure passwords – changed regularly </li></ul><ul><li>Check site securi...
Personal policing <ul><li>Secure browser </li></ul><ul><li>Secure passwords – changed regularly </li></ul><ul><li>Social n...
Main problems: <ul><li>Transnational nature of the crimes. Most policing is local.  </li></ul><ul><li>How much do the poli...
How many people have been prosecuted under the different laws? How much does it cost to police and prosecute under the dif...
Upcoming SlideShare
Loading in...5
×

Forensic Science Informatics P3 M3 D3

2,812

Published on

Slides for BTEC Applied Science (Forensics) unit 37

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,812
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
63
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Forensic Science Informatics P3 M3 D3

  1. 1. Forensic Science Informatics Unit 37
  2. 2. Forensic Science Informatics <ul><li>P3 describe crimes committed using the Internet </li></ul>
  3. 3. Task 1 <ul><li>List crimes committed using the Internet </li></ul><ul><li>Choose five of the crimes and describe them. (How can they be avoided?) </li></ul><ul><li>Compile a glossary of computer crime/ sabotage terms </li></ul><ul><li>The terms should include: </li></ul><ul><li>  </li></ul><ul><li>Clipper chip Trojan horse  </li></ul><ul><li>Encryption Virus </li></ul><ul><li>Logic bomb Worm </li></ul><ul><li>Pinging Spyware </li></ul><ul><li>Remailer Adware </li></ul><ul><li>Trapdoor </li></ul>
  4. 4. Computer crimes
  5. 5. Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is policed (M3) </li></ul>
  6. 6. Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is policed </li></ul>
  7. 7. Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is policed </li></ul>
  8. 8. Task 2 <ul><li>Policing the Internet </li></ul><ul><li>Explain how the Internet is policed </li></ul>
  9. 9. Explain <ul><li>Make plain and comprehensible </li></ul><ul><li>Requires details, examples and description </li></ul><ul><li>More than a few sentences! </li></ul>
  10. 10. Internet <ul><li>Internet </li></ul><ul><li>World Wide Web </li></ul>
  11. 11. “ Policed” <ul><li>I keep six honest serving-men (They taught me all I knew); Their names are What and Why and When And How and Where and Who . </li></ul><ul><li>Rudyard Kipling </li></ul>
  12. 12. Key questions <ul><li>What </li></ul><ul><li>Why </li></ul><ul><li>When </li></ul><ul><li>How </li></ul><ul><li>Where </li></ul><ul><li>Who </li></ul>is policing the Internet? do we police the Internet? do we police the Internet? do we police the Internet? do we police the Internet? polices the Internet?
  13. 13. Key questions <ul><li>What is policing the Internet? </li></ul><ul><li>Why do we police the Internet? </li></ul><ul><li>When do we police the Internet? </li></ul><ul><li>How do we police the Internet? </li></ul><ul><li>Where do we police the Internet? </li></ul><ul><li>Who polices the Internet? </li></ul>
  14. 14. Key questions <ul><li>What is policing the Internet? </li></ul><ul><li>Why do we police the Internet? </li></ul><ul><li>When do we police the Internet? </li></ul><ul><li>How do we police the Internet? </li></ul><ul><li>Who polices the Internet? </li></ul>
  15. 15. Key questions <ul><li>What is policing the Internet? </li></ul><ul><li>Why do we police the Internet? </li></ul><ul><li>How do we police the Internet? </li></ul><ul><li>Who polices the Internet? </li></ul>
  16. 16. Key questions <ul><li>What is policing the Internet? </li></ul><ul><li>Why do we police the Internet? </li></ul><ul><li>How do we police the Internet? </li></ul><ul><li>Who polices the Internet? </li></ul>
  17. 17. Task 3 <ul><li>Evaluate the methods used for policing the Internet (D3) </li></ul>
  18. 18. Task 3 <ul><li>Evaluate the methods used for policing the Internet (D3) </li></ul>
  19. 19. Evaluate <ul><li>Evaluate the methods used for policing the Internet (D3) </li></ul><ul><li>What are the strengths and weaknesses? </li></ul><ul><li>How effective is it? </li></ul><ul><li>How it could be improved? </li></ul><ul><li>Should we police the Internet? </li></ul>
  20. 20. Personal policing <ul><li>Secure browser </li></ul><ul><li>Secure passwords – changed regularly </li></ul><ul><li>Social networking sites </li></ul>
  21. 21. Social networking sites & messaging <ul><li>Again secure passwords – changed regularly </li></ul><ul><li>Check site security levels – eg on facebook (who do you want seeing your information: friends or friends of friends or everyone?) </li></ul><ul><li>No addresses </li></ul><ul><li>First name only? </li></ul><ul><li>Don’t announce you are going away </li></ul><ul><li>Don’t meet anyone met online face-face without telling someone else </li></ul>
  22. 22. Personal policing <ul><li>Secure browser </li></ul><ul><li>Secure passwords – changed regularly </li></ul><ul><li>Social networking sites </li></ul><ul><li>More secure operating system eg OS X or Linux </li></ul><ul><li>Firewall </li></ul><ul><li>Update all software </li></ul><ul><li>Anti-spy ware – Spy Bot </li></ul><ul><li>Adaware </li></ul><ul><li>Anti-virus eg AVG keep up to date </li></ul><ul><li>Don’t open an attachment from someone you don’t trust </li></ul><ul><li>Filters eg Net nanny </li></ul>
  23. 23. Main problems: <ul><li>Transnational nature of the crimes. Most policing is local. </li></ul><ul><li>How much do the police understand the Internet and computer technology? </li></ul><ul><li>Resources and person power are limited – how much time can the police devote to cyber crime? </li></ul><ul><li>What responsibility do the ISPs have/ How can they enforce it? </li></ul><ul><li>How much relies upon word of mouth and people reporting dodgy sites? </li></ul><ul><li>Are there better methods? Parents careful about how their children use the Internet. </li></ul><ul><li>Better educate children in safe surfing at school? </li></ul><ul><li>Cheaper to educate parents; use firewalls, net filters and virus software up to date, use safer browsers eg Mozilla Firefox. </li></ul>
  24. 24. How many people have been prosecuted under the different laws? How much does it cost to police and prosecute under the different laws? What problems do the organisations face? How do the organisations link up? Some key issues to be researched:
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×