Forensic Science Informatics P3 M3 D3

24
Forensic Science Informatics Unit 37

description

Slides for BTEC Applied Science (Forensics) unit 37

Transcript of Forensic Science Informatics P3 M3 D3

Page 1: Forensic Science Informatics P3 M3 D3

Forensic Science Informatics

Unit 37

Page 2: Forensic Science Informatics P3 M3 D3

Forensic Science Informatics

• P3 describe crimes committed using the Internet

Page 3: Forensic Science Informatics P3 M3 D3

Task 1• List crimes committed using the Internet• Choose five of the crimes and describe them. (How can they

be avoided?)Compile a glossary of computer crime/ sabotage terms The terms should include:

Clipper chip Trojan horse Encryption VirusLogic bomb WormPinging SpywareRemailer AdwareTrapdoor

Page 4: Forensic Science Informatics P3 M3 D3

Computer crimes

Page 5: Forensic Science Informatics P3 M3 D3

Task 2

• Policing the InternetExplain how the Internet is policed (M3)

Page 6: Forensic Science Informatics P3 M3 D3

Task 2

• Policing the InternetExplain how the Internet is policed

Page 7: Forensic Science Informatics P3 M3 D3

Task 2

• Policing the InternetExplain how the Internet is policed

Page 8: Forensic Science Informatics P3 M3 D3

Task 2

• Policing the InternetExplain how the Internet is policed

Page 9: Forensic Science Informatics P3 M3 D3

Explain

• Make plain and comprehensible• Requires details, examples and description• More than a few sentences!

Page 10: Forensic Science Informatics P3 M3 D3

Internet

Internet

World Wide Web

Page 11: Forensic Science Informatics P3 M3 D3

“Policed”

I keep six honest serving-men(They taught me all I knew);Their names are What and Why and When And How and Where and Who.

Rudyard Kipling

Page 12: Forensic Science Informatics P3 M3 D3

Key questions

• What• Why• When• How• Where• Who

is policing the Internet?

do we police the Internet?do we police the Internet?

do we police the Internet?do we police the Internet?

polices the Internet?

Page 13: Forensic Science Informatics P3 M3 D3

Key questions

• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Where do we police the Internet?• Who polices the Internet?

Page 14: Forensic Science Informatics P3 M3 D3

Key questions

• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Page 15: Forensic Science Informatics P3 M3 D3

Key questions

• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Page 16: Forensic Science Informatics P3 M3 D3

Key questions

• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Page 17: Forensic Science Informatics P3 M3 D3

Task 3

Evaluate the methods used for policing the Internet (D3)

Page 18: Forensic Science Informatics P3 M3 D3

Task 3

Evaluate the methods used for policing the Internet (D3)

Page 19: Forensic Science Informatics P3 M3 D3

Evaluate

Evaluate the methods used for policing the Internet (D3)

• What are the strengths and weaknesses?• How effective is it?• How it could be improved?• Should we police the Internet?

Page 20: Forensic Science Informatics P3 M3 D3

Personal policing

• Secure browser• Secure passwords – changed regularly• Social networking sites

Page 21: Forensic Science Informatics P3 M3 D3

Social networking sites & messaging

• Again secure passwords – changed regularly• Check site security levels – eg on facebook (who do you

want seeing your information: friends or friends of friends or everyone?)

• No addresses• First name only?• Don’t announce you are going away• Don’t meet anyone met online face-face without telling

someone else

Page 22: Forensic Science Informatics P3 M3 D3

Personal policing• Secure browser• Secure passwords – changed regularly• Social networking sites• More secure operating system eg OS X or Linux• Firewall• Update all software• Anti-spy ware – Spy Bot• Adaware • Anti-virus eg AVG keep up to date• Don’t open an attachment from someone you don’t trust• Filters eg Net nanny

Page 23: Forensic Science Informatics P3 M3 D3

Main problems:

1. Transnational nature of the crimes. Most policing is local. 2. How much do the police understand the Internet and computer technology?3. Resources and person power are limited – how much time can the police devote to cyber crime?4. What responsibility do the ISPs have/ How can they enforce it?5. How much relies upon word of mouth and people reporting dodgy sites? 6. Are there better methods? Parents careful about how their children use the Internet. 7. Better educate children in safe surfing at school?8. Cheaper to educate parents; use firewalls, net filters and virus software up to date, use safer browsers eg Mozilla Firefox.

Page 24: Forensic Science Informatics P3 M3 D3

How many people have been prosecuted under the different laws?

How much does it cost to police and prosecute under the different laws?

What problems do the organisations face?

How do the organisations link up?

Some key issues to be researched: