Pages in this set

Page 1

Preview of page 1
Computer Crime & the Law

Page 2

Preview of page 2
Computer Crime & Malpractice
New technology is always a target for crime
As ICT has developed, so has computer abuse
The internet is widely known to be used by
­ Fraudulent traders
­ Paedophiles
­ Hackers
­ Software pirates
­ Terrorists
Computer malpractice refers to acts which are
unethical although…

Page 3

Preview of page 3
­ Unauthorised access to data held on a computer
Extent of hacking is difficult to assess
Much of it is only discovered by accident
Often carried by corrupt employees or employees
with a grudge
­ They have insider knowledge of passwords and user Ids
At one level, the…

Page 4

Preview of page 4
Much of the hacking that takes place has nothing to
do with a fascination for technology
It is purely theft
Credit card details are stolen by hackers and then
used to make fraudulent purchases
Card details may also be stolen by more traditional
methods and then used to make…

Page 5

Preview of page 5
Fraud on the Internet
Most of the fraud on the internet is caused by lack of control
Anyone can set up a site purporting to be a particular
Goods are offered for sale ­ but never delivered
Another type of illicit trade involves the sale of software
which ­…

Page 6

Preview of page 6
How a virus works

ORIGINATION - A programmer writes a program - the virus - to cause
mischief or destruction. The virus is capable of reproducing itself
TRANSMISSION - Often, the virus is attached to a normal program. It
then copies itself to other software on the hard disk…

Page 7

Preview of page 7
Logic Bomb
Similar to a virus ­ may be delivered by a virus
Can be written to destroy, or even subtly alter the contents
of a computer system
May require a further signal for activation
May require a further signal to prevent activation
­ As in a case of extortion…

Page 8

Preview of page 8
Digital Crime and the Law
Laws have had to be passed that can have an
international impact
The EU have discussed a directive for a standard
on Internet-related laws
Computer Misuse Act of 1990
1. Unauthorised access to computer programs or data
2. Unauthorised access with a further criminal intent…

Page 9

Preview of page 9
Software & Music Copyright Laws
Covered by
­ Copyright Designs and Patents Act of 1988
Provisions of the Act make it illegal to:
­ Copy software
­ Run pirated software
­ Transmit software over a telecomms line, thereby creating a copy
Software can be illegally copied and distributed
In addition,…

Page 10

Preview of page 10
Computers against crime
Computers are now invaluable in the fight against crime
In the 1980s police forces kept information on:
­ Cards
­ Basic computer systems
If crimes were committed in different force areas if was
difficult to create a combined enquiry
­ Data was not portable
The case of…


Mr A Gibson


Number two of three presentations which provide a good overview of this topic area.

Resource 1 - Security of Data

Resource 2 - Computer Crime - this resource

Resource 3 - Protecting ICT Systems

Download these to your mobile device and review on the go!



awful man na



gibson = ...



gibson = ...



downloading pirated songs every day

Similar ICT resources:

See all ICT resources »