Module 2.2 1. 2 Introduction Introduction Techniques and tools used to commit computer crimes...

30
Module 2.2 The dangers of computer crime 1

Transcript of Module 2.2 1. 2 Introduction Introduction Techniques and tools used to commit computer crimes...

Page 1: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

1

Module 2.2

The dangers of computer crime

Page 2: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

2

Module 2.2

The dangers of computer crime

Page 3: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

3

Introduction

Techniques and tools used to commit computer

crimes

Categories of computer crime

Protecting yourself against cybercrime

Test and improve your knowledge

Content

Page 4: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

4

Computer crime can be seen in two ways –

where a computer system is the target of the crime (e.g. ‘hacking’) and where computer technology is used to enable or commit the crime.

Introduction

Page 5: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

5

Any attempt to manipulate or ‘con’ someone intogiving out information such as a password or account number which can be used to impersonate them.

Social engineering

Malware Software specifically designed to install itself without the user’s knowledge and to affect or harm a computer system . This includes viruses and spyware.

Page 6: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

6

Techniques and tools used to commit computer crimes

Page 7: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

7

It refers to attempts from people to con the user into giving out personal and confidential details such as PIN numbers and passwords, etc. by posing as a legitimate organisation, usually via e‑mail.

Phishing

Page 8: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

8

E‑mail spoofing is the forgery of an e‑mail header so that the e‑mail appears to be from a different origin (or person).

Spoofing

Page 9: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

9

A computer worm is malware that is able to distribute itself over a network, normally via e‑mail, without a person having run an infected program.

Computer worm

Page 10: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

10

Written to disrupt the normal functioning of a person’s computer without their knowledge or consent. Used to turn your computer into a ‘bot’ to spread malware or

to create security loopholes for other programs to exploit.

Computer virus

Page 11: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

11

Tries to monitor and track the way you use your computer. It then sends this information to third parties without your consent or knowledge.

Spyware

Page 12: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

12

Records your keystrokes as you type and can possibly even record the movements of your mouse and take screenshots of what is displayed on your screen.

Keylogger

Page 13: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

13

Type of malware which is a destructive program disguised as a useful application.

Trojan

Page 14: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

14

When a computer is ‘hacked’ so that when the user types in a ‘valid’ URL in their browser they are taken to another website, which is often a replica.

Pharming

Page 15: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

15

A computer that has been compromised (or infected) and can be controlled remotely when it is on and connected to the Internet.

Bots

Page 16: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

16

Software that downloads onto your computer and bombards your computer with adverts that pop‑up whenever you are connected to the Internet.

Adware

! !

Page 17: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

17

Categories of computer crime

Page 18: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

18

Harassment

Cyberstalking

Spam

Uploading unauthorised pictures on the Web

Cyberbullying

Page 19: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

19

Cyber attacks

business

cyber attacks

website cyber attacks

cyberterrorism

denial of

service attacks

Page 20: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

20

Computers and theft Bandwidth

Identity

Processing time and power

Money

Copyrighted material

Data/Intellectual property

Page 21: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

21

The criminal either has to:obtain essential information,

such as a user name and password, in order to access a secure system

get physical access to a computer so that data can be downloaded directly onto portable media.

How is the theft carried out?

Page 22: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

22

Protecting yourself against cybercrime

Page 23: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

23

Assume nothingBelieve no one Check everything

A ‘paranoid ABC’

A B

C

Page 24: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

24

Software you need to help protect your computer

Anti-virus software

Computer programs that scan computer files for viruses and eliminate them.

update it regularly

Page 25: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

25

Software you need to help protect your computer

Firewall software

Software that allows you to control which programs can access the Internet and

protects your computer or network from unauthorised access.

Page 26: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

26

Software you need to help protect your computer

Anti-spyware software

Anti-spyware software detects spyware that has been installed on a computer.

update it regularly

Page 27: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

27

Be careful when installing ‘free’ software .

Have good password policies.Stay informed.

Precautions to take

Page 28: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

28

Don’t give out personal information.

Don’t click on links in pop‑ups.Don’t open attachments or programs unless you are sure of what they are.

Don’t be gullible.

What NOT to do

Page 29: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

29

Test and improve your knowledge

Page 30: Module 2.2 1. 2  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.

30

Written module activity