Pages in this set

Page 1

Preview of page 1
GCSE ICT Computer Crime

Where there are ways to make money, there will be criminals just waiting
to take advantage.

The growth of the Internet has provided criminals with a whole host of
different methods to try to relieve you of your hard earned cash.

Computer crime is defined as…

Page 2

Preview of page 2
Data can be stolen either by physical theft of hardware, or through
unauthorised access to the system e.g. hacking.




Fraud means trying to trick someone in order to gain an advantage.

For your GCSE course, we are primarily concerned with fraud which
takes place using ICT.

There are a number…

Page 3

Preview of page 3
Stealing your identity in order to pose as you to steal your
money or some other criminal activity.

Copying software, music or film DVDs is called 'software piracy'.

I bet most of us have copied a game to give to a mate or have heard a
cool track and downloaded…

Page 4

Preview of page 4
Viruses can be sent to you via email attachments. They can be
hidden in spreadsheet or word documents. They can also be
unwittingly downloaded from Internet sites that carry pirated music and
movie files.

Viruses can be prevented by taking sensible precautions, including:

Using a commercial antivirus software to scan…

Page 5

Preview of page 5
A business can use a range of physical methods to protect their
systems. Some of these include:

Keeping important computers such as servers or mainframes in locked
rooms

Posting security guards

Security locks, smart cards

Keeping sensitive data on standalone machines instead of networks

Using alarm systems and video cameras…

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »