created by: robert mcandrews career & technology education humble independent school district

23
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.

Upload: bonnie-dalton

Post on 16-Dec-2015

216 views

Category:

Documents


2 download

TRANSCRIPT

Created by: Robert McAndrewsCareer & Technology Education

Humble Independent School District.

Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.

Computer crime can be defined as criminal activity involving computer information technology systems.

--Wikipedia

illegal access (unauthorized access) illegal interception (by technical means of non-

public transmissions of computer data to, from or within a computer system)

data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data)

systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data)

misuse of devices forgery (ID theft) and electronic fraud

Wikipedia

An acceptable use policy (AUP; also sometimes acceptable usage policy) is a set of rules applied by network and website owners which restrict the ways in which the network or site may be used. AUP documents are written for corporations, businesses, universities, schools, and website owners often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.

Wikipedia

http://tlo2.tlc.state.tx.us/statutes/pe.toc.htm

PENAL CODE CHAPTER 33. COMPUTER CRIMES

What is Penal Code?penal code n. A body of laws relating to crimes and offenses and the penalties for their commission.

Computer Security is used often to describe keeping computer programs and data safe from being damaged or stolen.

There is not much risk unless the computer is connected to a network such as the Internet.

Your home computer is a popular target for intruders.

Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find.

By stealing that information, intruders can use your money to buy themselves goods and services.

Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings.

Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks.

People with the will and intent to do harmare often referred to as "crackers"--as in "cracking" into computers.

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Unauthorized use◦Using a computer system

without permission Hacking or Cracking

◦Breaking into computer systems for fun or to damage information.

Sabotage and blackmail◦Breaking into system to fraud or steal

Piggybacking◦ Internet access without paying

Zapping Data diddling Scavenging Hardware theft

◦ Laptop/notebook computers Software piracy or theft

◦ Federal Crime Information theft

◦ Intellectual property

Piggybacking is a term used to refer to obtaining a wireless internet connection by bringing one's own computer within the range of another's wireless connection without that subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice.

To get a free ride

When a bug is detected after the software is released, the only way to fix the already compiled code is to overlay the imperfect or buggy code with a sequence of corrected code. This overlaying is known as zapping (verb) and the fix itself is a zap.

In generic computing, to zap (verb) can also mean to erase or get rid of something.

http://www.csgnetwork.com/glossary.html

Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.

http://www.nrps.com/community/comprev.asp

Unauthorized access to information left on discarded media.

Going through the garbage to obtain valuable information that can be used to gain access and/or steal.

Dumpster Diving.

Stealing a computer or peripheral device such as: keyboard, mouse, printer

Software theft The unauthorized and illegal copying of

copyrighted software Also known as software piracy or

information theft.

Passwords◦ Remembered Information

Possessed Objects◦ Badges, cards, keys

Biometric Devices◦ Fingerprint, signature◦ eye or voice patterns

Encryptions Backup Procedures Surge Protector

◦ To Prevent System Failures

A potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which it comes in contact with.

Illegal computercode that can dosuch things as alterprograms and/ordestroy data.

Worm Worm Program Time bomb Logic bomb Trojan horse Virus hoax

Computer or software that has been attacked and to which the virus has attached itself

A virus can be spread byan external storage devicesuch as a diskette.

Viruses can be spread bydownloading from theInternet.

Install an Anti-Virus Program also known as vaccines.

Scan Storage Devices before using them◦ Disks, CD’s/DVD’s, Flash Drives

Double Check all Downloaded Files from Internet

Do Not Download if source is unknown

The term white hat is used for a person who is ethically opposed to the abuse of computer systems.

A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent.