Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Computer Crime & Malpractice
New technology is always a target for crime
As ICT has developed, so has computer abuse
The internet is widely known to be used by
­ Fraudulent traders
­ Paedophiles
­ Hackers
­ Software pirates
­ Terrorists
Computer malpractice refers to acts which are
unethical although perhaps legal…read more

Page 3

Preview of page 3

Here's a taster:

Hacking
Definition:
­ Unauthorised access to data held on a computer
Extent of hacking is difficult to assess
Much of it is only discovered by accident
Often carried by corrupt employees or employees
with a grudge
­ They have insider knowledge of passwords and user Ids
At one level, the motive for doing it is just the
challenge
At any level it is illegal…read more

Page 4

Preview of page 4

Here's a taster:

Fraud
Much of the hacking that takes place has nothing to
do with a fascination for technology
It is purely theft
Credit card details are stolen by hackers and then
used to make fraudulent purchases
Card details may also be stolen by more traditional
methods and then used to make purchases on the
internet
Theft of data
­ Data can be stolen:
· by illegally hacking into a computer and downloading data
· by stealing the actual computer…read more

Page 5

Preview of page 5

Here's a taster:

Fraud on the Internet
Most of the fraud on the internet is caused by lack of control
Anyone can set up a site purporting to be a particular
organisation
Goods are offered for sale ­ but never delivered
Another type of illicit trade involves the sale of software
which ­ once the buyer pays for it ­ is apparently available
for download
­ The software will either be garbage or not arrive at all
You need to be aware of the schemes that are available…read more

Page 6

Preview of page 6

Here's a taster:

Viruses
How a virus works
ORIGINATION - A programmer writes a program - the virus - to cause
mischief or destruction. The virus is capable of reproducing itself
TRANSMISSION - Often, the virus is attached to a normal program.…read more

Page 7

Preview of page 7

Here's a taster:

Logic Bomb
Similar to a virus ­ may be delivered by a virus
Can be written to destroy, or even subtly alter the contents
of a computer system
May require a further signal for activation
May require a further signal to prevent activation
­ As in a case of extortion
Sometimes, the threat of a bomb having been placed may
cause an institution to hand over money
Many large organisations would not want the lack of
security on their systems exposed…read more

Page 8

Preview of page 8

Here's a taster:

Digital Crime and the Law
Laws have had to be passed that can have an
international impact
The EU have discussed a directive for a standard
on Internet-related laws
Computer Misuse Act of 1990
1. Unauthorised access to computer programs or data
2. Unauthorised access with a further criminal intent
3. Unauthorised modification of computer material (I.e.…read more

Page 9

Preview of page 9

Here's a taster:

Software & Music Copyright Laws
Covered by
­ Copyright Designs and Patents Act of 1988
Provisions of the Act make it illegal to:
­ Copy software
­ Run pirated software
­ Transmit software over a telecomms line, thereby creating a copy
Software can be illegally copied and distributed
In addition, the look and feel of software can be copied
In the UK, the Business Software Alliance targeted small and
medium sized businesses to ensure that software is
correctly licensed
FAST ­ the Federation Against Software…read more

Page 10

Preview of page 10

Here's a taster:

Computers against crime
Computers are now invaluable in the fight against crime
In the 1980s police forces kept information on:
­ Cards
­ Basic computer systems
If crimes were committed in different force areas if was
difficult to create a combined enquiry
­ Data was not portable
The case of the Yorkshire Ripper cause a massive enquiry
into the way that investigative evidence was handled
The HOLMES system was devised to enable the comparison
of information in a more efficient and comprehensive way
All manner…read more

Comments

Mr A Gibson

Number two of three presentations which provide a good overview of this topic area.

Resource 1 - Security of Data

Resource 2 - Computer Crime - this resource

Resource 3 - Protecting ICT Systems

Download these to your mobile device and review on the go!


Aaronyjoy1

awful man na

Aaronyjoy1

gibson = ...

Aaronyjoy1

gibson = ...

Similar ICT resources:

See all ICT resources »See all resources »