c omputer c rimes “criminal activity directly related to the use of computers, specifically...

15

Upload: jasper-tyler

Post on 18-Jan-2018

218 views

Category:

Documents


0 download

DESCRIPTION

“Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.” - The American Heritage® Dictionary of the English Language: Fourth Edition “This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.” - Wikipedia

TRANSCRIPT

Page 1: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of
Page 2: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

COMPUTER CRIMES

Page 3: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

COMPUTER CRIMES “Criminal activity directly related to the use

of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.”

- The American Heritage® Dictionary of the English Language: Fourth Edition.  2000

“This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.”

- Wikipedia

Page 4: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

FORMS OF COMPUTER CRIME Theft of Hardware

Eg: shoplifting of accessory or taking the whole system unit

Theft of Software Software Piracy – unauthorized copying of

programs for personal gain Act of using software without the appropriate license

RA8293 (Intellectual Property Code of the Phils) declares that computer programs are copyrightable

Penalty: 1-3 yrs imprisonment plus fine ranging from P50,000-150,000 for the 1st offense

Page 5: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

FORMS OF COMPUTER CRIME Theft of Time and Services

Eg: Using computer for non-work related things

Theft of InformationEg: stealing/selling of personal information

(Identity Theft) Crimes of Malice and Destruction

Perpetrators are more interested in abusing or vandalizing computer systems

Eg: defacing web sites

Page 6: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

TYPES OF COMPUTER CRIME Theft. Theft in computer crime may refer to either unauthorized

removal of physical items such as hardware or unauthorized removal or copying of data or information. It is well known that laptop computers are targeted at airports and restaurants. The prize garnered with theft of a laptop is usually the data or information such as passwords for corporate systems contained on the laptops rather than the hardware.

Fraud. Fraud on the Internet may run the gamut from credit card offers which are utilized only to capture personal information, to investor postings which promote a stock or investment offer to encourage investment which will benefit the person posting the information, to medical and pharmaceutical -related sites which purport to provide correct medical advice or sell altered medications.

Copyright infringement. The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased). Software piracy occurs more easily with the ability to post files for downloading all over the world.

Page 7: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

VIRUSES A virus is a segment of program code

that implants itself to one of the executable files and spreads systematically from one file to another.

A virus can only spread from one computer to another when its host is taken to the uninfected computer

Functions: Spreads itself from one file to another without

the user’s input or knowledge (Self-replication and Propagation)

Implements the symptom or damage planned by the perpetrator (Virus Payload) Include erasing a disk, corrupting programs,

create havoc

Page 8: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

SOME CATEGORIES OF VIRUSES Boot Sector Viruses

Boot Sector – part of the system software that contains most of the instructions for booting up the system.

Most hostile type; replaces the boot instructions & loads the virus into main memory before the OS thereby infecting other disks that come in contact with it

File-Infecting Viruses Attaches itself to executable files that actually begin a

program Worms

Programs that spreads by replicating itself and clogs the system with copies of itself

Commonly spread via e-mail message attachments Bombs

Hides in a user’s disk and waits for a specific event to occur before running

Page 9: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

SOME CATEGORIES OF VIRUSES Trojan Horses

any program that presents itself as performing one task while actually performing another that causes damage.

Usually downloaded from the Internet at a valid and useful program (eg: wallpaper changer). After being run by the user, it can destroy files or replace some other program

Stealth Viruses Resides in computer memory making detection

difficult Can conceal the damage it created from the user

and the OS E-mail Viruses

Transmitted as an attachment to an email message

Page 10: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

HOW TO PROTECT YOUR COMPUTERS FROM VIRUSES? Avoid high risk sources

Most often found on public domain software or from pirated copies of commercial software.

Eg. Metacafe, Utorrent and Bittorent Use a virus detection software

Before running/opening any file especially those from high risk sources, check the source using a virus detection software

Regularly update your virus definitions for the software to be effective

Conduct regular virus scan of your computer system Eg: Norton Anti-Virus, Kaspersky, Avira, AVG and etc.

Page 11: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

WHAT IF A VIRUS IS DETECTED? For networked systems, immediately inform

the network administrator or any personnel from the MIS or Systems Administrator- Jun Alcantara

For personal systems: Use the disinfect/clean function of the virus

detection software Erase the infected file

Page 12: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of

COMPUTER CRIMINALS Employees

They commit 80% of the crimes ranging from stealing SW, HW & other peripherals, computer fraud, proprietary information & time

Greatest threat from disgruntled employees. Outside Users

Clients & other entities who do business with a company can gain access to info & use it to commit crimes.

Hackers and Crackers Hackers – people who gain unauthorized access to

computer system for fun & challenge Crackers – people who gain unauthorized access for

malicious purposes (for financial gain or to destroy data).

Organized Crime Use computers for illegal activities such as

counterfeiting.

Page 13: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of
Page 14: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of
Page 15: C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of