Upload
hawa
View
52
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Issues for Computer Users, Electronic Devices, Computer and Safety. Objectives. Summarize the dangers of sharing personal information on the Internet. Explain how cookies and global unique identifiers endanger privacy. Identify techniques that intruders use to attack computer systems. - PowerPoint PPT Presentation
Citation preview
Issues for Computer Users, Electronic Devices, Computer and Safety
Objectives Summarize the dangers of sharing personal
information on the Internet.
Explain how cookies and global unique identifiers endanger privacy.
Identify techniques that intruders use to attack computer systems.
Discuss different types of cybercrime.
Summarize how computer crime costs businesses money.
Objectives Describe ways criminals obtain passwords.
Discuss ways to protect your computer from being accessed by others.
Explain the criteria of a strong password.
Summarize ways to stay safe online.
Cyber Bullying
Computer Ethics You Tube Video
Key Terms
Global Unique Identifier (GUID)
Computer Crime
Cybercrime
Downtime
Identity Theft
Phishing
Key Terms
Scanning
Software Piracy
Spoof
Virus
Worm
Trojan Horse
Key Terms
Time Bomb
Computer Crime and Intellectual Property Section (CCIPS)
Computer Hacking and Intellectual Property Project (CHIP)
National Infrastructure Protection Center (NIPC)
Introduction
Computers are tools and, like other tools,
they are controlled by the person using them.
People can use computers to learn, to
communicate, and to have fun. However, people
can also use computers to snoop into another
person’s private life or to commit crimes.
Privacy Online
Privacy in Cyberspace
Many consumers share personal informationabout themselves, their habits, and theirfinances. Sometime, however, such informationis gathered without a person’s knowledge orapproval.
Privacy OnlinePrivacy in Cyberspace
New Technology and Your Privacy
Cookies is a small file that is saved to your harddrive when you visit some Web sites. Cookiesgives Web sites a way of storing information aboutyou in return.
Global Unique Identifiers is a unique identificationnumber that is generated by a piece of hardware orby a program.
Used to set the level of your Internet
Security
All About Cybercrime
Cybercrime Techniques
Many cybercrimes are based on the ability ofpeople to tap illegally into computer
networks. They may create a virus, worm, or TrojanHorse program to infiltrate computers anddamage or delete data. Viruses aredestructive computer programs that canmove from one operating system to another.
All About Cybercrime
Cybercrime Techniques
Scanning - intruders develop programs that try
many different passwords until one works.
However, networks can be blocked from scanners
by limiting the number of failed attempts to log
onto the system. After three password failures, for
instance, the network can refuse access.
All About Cybercrime
Spoofing – intruders use a false Internet Protocol
(IP) or e-mail address to gain access. Intruders
assume the IP address of a trusted source to enter a
secure network and distribute e-mails contain
Viruses.
All About Cybercrime
Phishing – criminals use an official-looking e-mail
to lure victims into giving personal data such as
user name, passwords, bank account numbers,
or credit card details.
Time Bombs – are malicious programs is activated
by an event or set of circumstances.
All About Cybercrime
Types of Cybercrime
Fraud – When someone steals your personalinformation, he or she can impersonate you andmake credit card purchases in your name or accessyour bank accounts. This is called Identity theft.
Software piracy – is the illegal copying of computerprograms. Software piracy affects software publishers. They lose money when people use illegal copies ofprograms to avoid paying for legitimate copies
All About CybercrimeTypes of Cybercrime
Cyber-bullying – is the use of the Internet and
related technologies to harm or harass other people,
in a deliberate, repeated, and hostile manner. As it has
become more common in society, particularly among
young people, legislation and awareness campaigns have
arisen to combat it.
http://www.youtube.com/watch?v=IPHpx9wefig
The High Cost of Computer Crimes
The Internet has opened the door to new
kinds of crime and new ways of carrying out
traditional crimes. Cyber Crimes involves
using the Internet. Computer crime is any
act that violates state or federal laws and
involves using a computer. Computer crime
causes businesses to lose money in the
following ways.
The High Cost of Computer Crimes
Downtime – workers cannot work because a
network is temporarily not available. A
company can lose business if customers are
affected by downtime.
Fighting CybercrimesThere are several government organizations that
assist in fighting Cybercrimes.
Computer Crime and Intellectual Property section
(CCIPS) – The Department of Justice created a
special group to advise and train federal
prosecutors and local law enforcement on
Cybercrime.
Fighting Cybercrimes
Computer Hacking and Intellectual Property
section (CHIP) – law enforcement officials and
prosecutors work together to pursue cybercrime.
National Infrastructure Protection Center (NIPC) –
ensures that the nation’s computer system could
continue to operate in the case of an attack.
Avoiding CybercrimePassword Theft
Many computer crimes start when an unauthorizeduser hacks, or gains unauthorized entry, into acomputer network. This often happens when theintruder learns the password to access the victim’scomputer and the network. Following are wayssuch criminals learn passwords. Packet sniffers –method of finding another’s passwords and cardnumbers.
Protecting Your Personal Data
Using Strong Password – Whenever you create a
password, don’t use things like family names, four
letter nicknames, or birth dates. You should use a
combination of at least six to ten Upper - and
lowercase letters, numbers, and symbols (*, #, $,
%, or &).
Protecting Your Personal Data
Avoid Site Registration – do not fill out a
registration form unless the site clearly says that
the data will not be shared with other people
without your approval.
Cyber Etiquette for Students
http://www.youtube.com/watch?v=swi2Ukr6XZ4