Computer misuse
•As everyone know that computer as a machine has evolved the
daily life of people.
•But this machine has also changed the way people can commit
crime.
•Computer crimes or in other words cyber crimes has now
spread very quickly because nearly every person alive has access
to a computer system so it is bound that some people may
misuse it.
3.
contd
•Given the statisticson crimes involving
computer must have started from a base of zero
in the not to distant past, it is hardly surprising
that there has been a sharp rise in the number
of crimes involving computing, and internet has
undoubtedly started a new security risk.
4.
Cybercrime
lCybercrime is definedby British police as the use of any computer network for crime and
the high-tech criminals of the digital age have not been slow to spot the opportunities.
lThe term hacking was originally used to describe an audacious practical joke, but has
become better known as a term for the activities of computer enthusiasts who uses their
skills against IT systems of governments and big corporations.
lThe love-bug virus crippled at least 45 million computers worldwide and caused billions of
dollars worth of damage. Information systems managers have long been aware of the need
to maintain system security, particularly against computer fraud and sabotage. However,
Information system managers may not consider their own programmers and analysts as
possible perpetrators of computer fraud and sabotage.
lIn addition, other programmers and analysts may be in prime positions to initiate other
forms of security problems, such as computer hacking, viruses and software copyright
violations. Yet it is tempting for managers to believe that most such security problems
come from outside the organisation.
5.
The Misuse ofComputers
In the United Kingdom, the Law Commission looked at
the extent to which existing criminal laws covered the use
of computers in four areas:
1.computer fraud;
2.unauthorised obtaining of information from a computer;
3.unauthorised alteration or destruction of information stored on a computer;
4.denying access to an authorised user.
6.
Computer Fraud
The LawCommission defined computer fraud as:
. . . conduct that involves the manipulation of a computer, by
whatever method, in order dishonestly to obtain money, property, or
some other advantage of value, or to cause loss.
The main offences currently covering computer fraud:
•fraud and theft;
•obtaining property by deception;
•false accounting;
•common law conspiracy to defraud.
7.
Unauthorised Obtaining ofInformation
The Law Commission identified three particular abuses:
1. computer hacking;
2. eavesdropping on a computer;
3. making unauthorised use of computers for personal benefit.
Historically, it has been difficult to convict anyone of computer
hacking:
– penetration of computer systems;
– alteration/destruction of data.
Under Section 1 of the Computer Misuse Act 1990, a person is
guilty of an offence if:
(a) he causes a computer to perform any function with intent
to secure access to any program or data held on any computer;
(b) the access he intends to secure is unauthorised;
(c) he knows at the time when he causes the computer to
perform the function that this is the case.
Section 2 makes it a more serious offence to commit the Section 1
offence with a view to further crime.
8.
Eavesdropping
Eavesdropping involves:
– secretlistening;
– secret watching.
The aim is the acquisition of information.
Historically, there has been no right to privacy in the UK. The recently
introduced UK Human Rights Bill incorporates the European Convention on
Human Rights into UK law. Privacy is now recognised as a basic human right. For
instance, listening to mobile telephone calls is now illegal.
Most people who misuse computers for personal benefit are in
some form of legal relationship with the owner of the computer.
For example, an employee who does private work on their employer’s
computer. Here employment law can be applied.
The unauthorised use of the computer is not a special issue.
9.
Unauthorised Altering ofInformation
Computers store vast amounts of information about us:
– what we have in the bank;
– who we call on the telephone;
– what we buy in the shops;
– where we travel;
Criminals who alter or destroy such information can be dealt with by
– the law on Criminal Damage;
– the Computer Misuse Act 1990 (in Section 3).
The law on Criminal Damage seems to apply to physically stored data that would survive a power off-
on. Some examples:
– erasing programs from the control card of a circular saw;
– writing a program that shakes a hard disk to pieces.
But not:
– switching off a monitor so that the display is lost.
10.
Unauthorised Modification
Section 3of the Computer Misuse Act 1990 provides that a person
is guilty of a criminal offence if:
(a) he does any act which causes unauthorised modification
of the contents of a computer, and
(b) at the time when he does the act, he has the requisite
intent and the requisite knowledge.
The requisite intent is an intent to cause a modification to the contents of any
computer and by doing so:
(i) to impair the operation of any computer;
(ii) to prevent or hinder access to any program or data held
on any computer;
(iii) to impair the operation of any such program or the reliability of any such
data.
11.
Forgery
The unauthorised alterationor destruction of data may amount to forgery.
The Forgery and Counterfeiting Act 1981 says:
A person is guilty of forgery if he makes a false instrument,
with the intention that he or another shall use it to induce
somebody to accept it as genuine, and by reason of so accepting
it, to do or not to do some act to his own or any other
person’s detriment.
An “instrument” is usually a written document.
However, it can also be “any disk, tape, sound-track or other device
on which information is stored by mechanical, electronic or
other means.”
E.g: a forged electronic mail message.
12.
Fraud Defined
•Fraud isany and by all means a person uses to
gain an unfair advantage over another person.
•Typically, a fraudulent act must involve:
–A false statement
–Knowledge
–Reliance
–Injury or loss
13.
contd
•PHISHING E-MAILS
•This isthe name given to e-mails that claim to be from your bank
or other financial organizations but are actually sent to you by
fraudsters.
•These e-mails typically urge you to click on a link that takes you to
a fake website which is often identical to the one you would expect
to see.
•You are then asked to verify or update your personal security
information.
• The fraudster who has created the fake website will then have
your security and other personal information. A genuine
organization will never send you this type of e-mail.
•These e-mails aren't normally addressed to you by name; they are
sent to millions of recipients in the hope that some will respond,
the aim of the e-mail is to trick you into providing your details.
15.
contd
TROJANS
•Trojans are usuallyreceived in e-mails that may contain files,
pages or attachments to open.
• Once opened, they can secretly install a program that can
monitor your online activity, down to what keys you're pushing
on your keyboard.
•This could mean the next time you enter your credit/debit card
details on your favorite on line shop, the fraudsters would be
alerted.
• This is one of the reasons why it is important that your
computer security is kept up to date.
16.
contd
MONEY MULE/ADDITIONAL INCOMEE-MAIL SCAM
•One of the many scams around involves someone offering, via
an e-mail or website; to pay funds into your account on the
understanding you then transfer them overseas.
•In return, you supposedly get a commission. Some of these
want an up front deposit; once you have paid, you will never
hear anything again and more likely than not have lost your
money.
17.
Intro To virus
•Virus: A true virus is capable of self replication on a machine. It
may spread between files or disks, but the defining character is
that it can recreate itself on it’s own with out traveling to a new
host
•Computer virus have become today’s headline news
•With the increasing use of the Internet, it has become easier for
virus to spread
•Virus show us loopholes in software
•Most virus are targeted at the MS Windows OS
18.
Background
•There are estimated70,000 computer
viruses in existence
•Over 300 new ones are created each month
•First virus was created to show loopholes in
software, developed by Pakistani
programmers.
Symptoms of VirusAttack
• Computer runs slower then usual
• Computer no longer boots up
• Screen sometimes flicker
• PC speaker beeps periodically
• System crashes for no reason
• Files/directories sometimes disappear
• Denial of Service (DoS)
21.
Virus through theInternet
•Today almost 87% of all viruses are spread through the
internet (source: ZDNet)
•Transmission time to a new host is relatively low, on
the order of hours to days
•“Latent virus”
contd
Trojan Horse
•Covert
•Leaks information
•Usuallydoes not reproduce
Worms
•Spread over network connection
•Worms replicate
•First worm released on the Internet was called Morris
worm, it was released on Nov 2, 1988.
24.
Macro
•Specific to certainapplications
•Comprise a high percentage of the viruses
•Usually made in WordBasic and Visual Basic
for Applications
•Microsoft shipped “Concept”, the first macro
virus, on a CD ROM called "Windows 95
Software Compatibility Test" in 1995
25.
Assignment
• Explain PakistanCyber crime law.
Explain all the section of cyber crime law and what
offences does it cover. Further, also state the details
of any case, which was trialed under this law