21 - Computer Crime


HideShow resource information
  • Created by: Ciaran
  • Created on: 24-09-08 11:56
Preview of 21 - Computer Crime

First 298 words of the document:

GCSE ICT Computer Crime
Where there are ways to make money, there will be criminals just waiting
to take advantage.
The growth of the Internet has provided criminals with a whole host of
different methods to try to relieve you of your hard earned cash.
Computer crime is defined as 'criminal activity directly related to the use
of computers'. It could be done in order
steal money
steal data or information
steal someone's identity
damage or disrupt someone's system
for revenge
cause general havoc for fun
copy software / films / music to avoid
paying for it.
Commerce on the Internet is mainly paid for
through the use of credit cards, either
personal or corporate credit cards.
Therefore thieves have been very active in obtaining stolen credit card
details to purchase goods and services over the Internet. This type of
crime runs to millions of pounds per year.
Until recently credit card numbers were
printed on supermarket receipts etc, but
you may have noticed that many
businesses only print part of the number now.
This has been done to make it harder to steal
vital details.
Online companies can now also check that the address for delivery
is the same as the true credit card owner, making it harder for the thief to
use the stolen card.
Data / Information is often the most valuable commodity any
business has. The cost of creating data again from scratch can far
outweigh the cost of any hardware or programs lost. Loss of data can
have various consequences, some of which can be seen below.

Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Data can be stolen either by physical theft of hardware, or through
unauthorised access to the system e.g. hacking.
Fraud means trying to trick someone in order to gain an advantage.
For your GCSE course, we are primarily concerned with fraud which
takes place using ICT.
There are a number of other cases where computer fraud can be
committed in order to make some kind of financial gain.…read more

Page 3

Preview of page 3

Here's a taster:

Stealing your identity in order to pose as you to steal your
money or some other criminal activity.
Copying software, music or film DVDs is called 'software piracy'.
I bet most of us have copied a game to give to a mate or have heard a
cool track and downloaded it from the Internet for free.…read more

Page 4

Preview of page 4

Here's a taster:

Viruses can be sent to you via email attachments. They can be
hidden in spreadsheet or word documents. They can also be
unwittingly downloaded from Internet sites that carry pirated music and
movie files.
Viruses can be prevented by taking sensible precautions, including:
Using a commercial antivirus software to scan your system daily
Update the scanning software regularly
Not allowing people to load unknown files on to your system
Not opening suspicious emails or attachments from strangers.…read more

Page 5

Preview of page 5

Here's a taster:

A business can use a range of physical methods to protect their
systems. Some of these include:
Keeping important computers such as servers or mainframes in locked
Posting security guards
Security locks, smart cards
Keeping sensitive data on standalone machines instead of networks
Using alarm systems and video cameras
The business can also use software to help protect their systems. Some
of these methods include:
Data encryption data is 'scrambled' before being transmitted through
a network. Only the authorised recipient has the 'key'.…read more


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all resources »