9
Crime Crime Slides by Rachel Wood-Ross Slides by Rachel Wood-Ross CSCI 101 CSCI 101 Thu 2pm Class Thu 2pm Class

Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Embed Size (px)

Citation preview

Page 1: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

CrimeCrime

Slides by Rachel Wood-RossSlides by Rachel Wood-Ross

CSCI 101CSCI 101

Thu 2pm ClassThu 2pm Class

Page 2: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

Computer CrimeComputer Crime

Sometimes referred to as Sometimes referred to as cybercrime, which is a generic cybercrime, which is a generic reference to criminal activities reference to criminal activities involving computer technology.involving computer technology.

Ranges from fraud and forgery to Ranges from fraud and forgery to espionage and sabotage.espionage and sabotage.

Page 3: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

The most commonThe most common

computer crimes computer crimes fallfall

under the fraudunder the fraud

and embezzlementand embezzlement

categories.categories.

Page 4: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

Negligence or incompetence is also Negligence or incompetence is also considered a crime in the computer considered a crime in the computer world.world.

Usually the result of poor input/output controlUsually the result of poor input/output control For example, when you pay a bill but continue to For example, when you pay a bill but continue to

receive late notices. The system has not caught up receive late notices. The system has not caught up with the payment.with the payment.

Careless actions which have negative effects, Careless actions which have negative effects, such as the accidental deletion of and such as the accidental deletion of and account, would constitute this type of crime.account, would constitute this type of crime.

This type of crime could also attract This type of crime could also attract scavenging, which is searching for scavenging, which is searching for information that may have some value on the information that may have some value on the black market, such as credit card information.black market, such as credit card information.

Page 5: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

Denial of ServiceDenial of Service

A type of computer virus that places A type of computer virus that places such heavy demands on e-mail such heavy demands on e-mail server resources that they are server resources that they are unable to handle the volume.unable to handle the volume.

They cause the internet to be flooded They cause the internet to be flooded with e-mail, each with an attached with e-mail, each with an attached program that causes more infected program that causes more infected e-mail to be sent.e-mail to be sent.

Page 6: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

VirusVirus

Two TypesTwo Types Worms and MacrovirusesWorms and Macroviruses

SourcesSources Most common source is the InternetMost common source is the Internet

E-mailE-mail Downloads Downloads

Diskettes and DVD/CD-ROMsDiskettes and DVD/CD-ROMs Computer networksComputer networks

Page 7: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

WormWorm

A worm is a computer program that makes copies of itself.

It tends to interfere with the normal operation of a program or the computer.

Page 8: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

E-Mail HoaxE-Mail Hoax E-mail hoaxes spread false E-mail hoaxes spread false

information with information with astonishing rapidity by astonishing rapidity by encouraging recipients to encouraging recipients to forward artificial forward artificial documents, chain letters, documents, chain letters, for example, to everyone for example, to everyone they know. they know.

E-mail hoaxes have become E-mail hoaxes have become easier to spot, using similar easier to spot, using similar terminology in all, for terminology in all, for instance, “Forward this to instance, “Forward this to everyone you know” or everyone you know” or “This really happened.”“This really happened.”

If you don’t know the If you don’t know the person sending, it is most person sending, it is most likely a hoax of some type.likely a hoax of some type.

Page 9: Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class

Rachel Wood-Ross

Protection Protection programs are programs are available with available with different levels different levels

of security. of security.

Invest in one!Invest in one!