Forensic Science Informatics P3 M3 D3
-
Upload
steve-bishop -
Category
Education
-
view
2.573 -
download
2
description
Transcript of Forensic Science Informatics P3 M3 D3
Forensic Science Informatics
Unit 37
Forensic Science Informatics
• P3 describe crimes committed using the Internet
Task 1• List crimes committed using the Internet• Choose five of the crimes and describe them. (How can they
be avoided?)Compile a glossary of computer crime/ sabotage terms The terms should include:
Clipper chip Trojan horse Encryption VirusLogic bomb WormPinging SpywareRemailer AdwareTrapdoor
Computer crimes
Task 2
• Policing the InternetExplain how the Internet is policed (M3)
Task 2
• Policing the InternetExplain how the Internet is policed
Task 2
• Policing the InternetExplain how the Internet is policed
Task 2
• Policing the InternetExplain how the Internet is policed
Explain
• Make plain and comprehensible• Requires details, examples and description• More than a few sentences!
Internet
Internet
World Wide Web
“Policed”
I keep six honest serving-men(They taught me all I knew);Their names are What and Why and When And How and Where and Who.
Rudyard Kipling
Key questions
• What• Why• When• How• Where• Who
is policing the Internet?
do we police the Internet?do we police the Internet?
do we police the Internet?do we police the Internet?
polices the Internet?
Key questions
• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Where do we police the Internet?• Who polices the Internet?
Key questions
• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Who polices the Internet?
Key questions
• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?
Key questions
• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?
Task 3
Evaluate the methods used for policing the Internet (D3)
Task 3
Evaluate the methods used for policing the Internet (D3)
Evaluate
Evaluate the methods used for policing the Internet (D3)
• What are the strengths and weaknesses?• How effective is it?• How it could be improved?• Should we police the Internet?
Personal policing
• Secure browser• Secure passwords – changed regularly• Social networking sites
Social networking sites & messaging
• Again secure passwords – changed regularly• Check site security levels – eg on facebook (who do you
want seeing your information: friends or friends of friends or everyone?)
• No addresses• First name only?• Don’t announce you are going away• Don’t meet anyone met online face-face without telling
someone else
Personal policing• Secure browser• Secure passwords – changed regularly• Social networking sites• More secure operating system eg OS X or Linux• Firewall• Update all software• Anti-spy ware – Spy Bot• Adaware • Anti-virus eg AVG keep up to date• Don’t open an attachment from someone you don’t trust• Filters eg Net nanny
Main problems:
1. Transnational nature of the crimes. Most policing is local. 2. How much do the police understand the Internet and computer technology?3. Resources and person power are limited – how much time can the police devote to cyber crime?4. What responsibility do the ISPs have/ How can they enforce it?5. How much relies upon word of mouth and people reporting dodgy sites? 6. Are there better methods? Parents careful about how their children use the Internet. 7. Better educate children in safe surfing at school?8. Cheaper to educate parents; use firewalls, net filters and virus software up to date, use safer browsers eg Mozilla Firefox.
How many people have been prosecuted under the different laws?
How much does it cost to police and prosecute under the different laws?
What problems do the organisations face?
How do the organisations link up?
Some key issues to be researched: