COMPUTER CRIMES COMPUTER CRIMES Criminal activity directly related

  • Slides: 15
Download presentation

COMPUTER CRIMES

COMPUTER CRIMES

COMPUTER CRIMES “Criminal activity directly related to the use of computers, specifically illegal trespass

COMPUTER CRIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data. ” - The American Heritage® Dictionary of the English Language: Fourth Edition. 2000 “This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement. ” - Wikipedia

FORMS CRIME Theft of Hardware � OF COMPUTER Eg: shoplifting of accessory or taking

FORMS CRIME Theft of Hardware � OF COMPUTER Eg: shoplifting of accessory or taking the whole system unit Theft of Software � Software Piracy – unauthorized copying of programs for personal gain Act of using software without the appropriate license RA 8293 (Intellectual Property Code of the Phils) declares that computer programs are copyrightable � Penalty: 1 -3 yrs imprisonment plus fine ranging from P 50, 000 -150, 000 for the 1 st offense �

FORMS OF COMPUTER CRIME Theft of Time and Services � Eg: Using computer for

FORMS OF COMPUTER CRIME Theft of Time and Services � Eg: Using computer for non-work related things Theft of Information � Eg: stealing/selling of personal information (Identity Theft) Crimes of Malice and Destruction � Perpetrators are more interested in abusing or vandalizing computer systems � Eg: defacing web sites

TYPES OF COMPUTER CRIME Theft in computer crime may refer to either unauthorized removal

TYPES OF COMPUTER CRIME Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information. It is well known that laptop computers are targeted at airports and restaurants. The prize garnered with theft of a laptop is usually the data or information such as passwords for corporate systems contained on the laptops rather than the hardware. Fraud on the Internet may run the gamut from credit card offers which are utilized only to capture personal information, to investor postings which promote a stock or investment offer to encourage investment which will benefit the person posting the information, to medical and pharmaceutical -related sites which purport to provide correct medical advice or sell altered medications. Copyright infringement. The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased). Software piracy occurs more easily with the ability to post files for downloading all over the world.

VIRUSES A virus is a segment of program code that implants itself to one

VIRUSES A virus is a segment of program code that implants itself to one of the executable files and spreads systematically from one file to another. A virus can only spread from one computer to another when its host is taken to the uninfected computer Functions: � Spreads itself from one file to another without the user’s input or knowledge (Self-replication and Propagation) � Implements the symptom or damage planned by the perpetrator (Virus Payload) Include erasing a disk, corrupting programs, create havoc

SOME CATEGORIES OF VIRUSES Boot Sector Viruses Boot Sector – part of the system

SOME CATEGORIES OF VIRUSES Boot Sector Viruses Boot Sector – part of the system software that contains most of the instructions for booting up the system. � Most hostile type; replaces the boot instructions & loads the virus into main memory before the OS thereby infecting other disks that come in contact with it � File-Infecting Viruses � Attaches itself to executable files that actually begin a program Worms Programs that spreads by replicating itself and clogs the system with copies of itself � Commonly spread via e-mail message attachments � Bombs � Hides in a user’s disk and waits for a specific event to occur before running

SOME CATEGORIES OF VIRUSES Trojan Horses � any program that presents itself as performing

SOME CATEGORIES OF VIRUSES Trojan Horses � any program that presents itself as performing one task while actually performing another that causes damage. � Usually downloaded from the Internet at a valid and useful program (eg: wallpaper changer). After being run by the user, it can destroy files or replace some other program Stealth Viruses � Resides in computer memory making detection difficult � Can conceal the damage it created from the user and the OS E-mail Viruses � Transmitted as an attachment to an email message

HOW FROM TO PROTECT VIRUSES? YOUR COMPUTERS Avoid high risk sources � Most often

HOW FROM TO PROTECT VIRUSES? YOUR COMPUTERS Avoid high risk sources � Most often found on public domain software or from pirated copies of commercial software. � Eg. Metacafe, Utorrent and Bittorent Use a virus detection software � Before running/opening any file especially those from high risk sources, check the source using a virus detection software � Regularly update your virus definitions for the software to be effective � Conduct regular virus scan of your computer system � Eg: Norton Anti-Virus, Kaspersky, Avira, AVG and etc.

WHAT IF A VIRUS IS DETECTED? For networked systems, immediately inform the network administrator

WHAT IF A VIRUS IS DETECTED? For networked systems, immediately inform the network administrator or any personnel from the MIS or Systems Administrator- Jun Alcantara For personal systems: � Use the disinfect/clean function of the virus detection software � Erase the infected file

COMPUTER CRIMINALS Employees They commit 80% of the crimes ranging from stealing SW, HW

COMPUTER CRIMINALS Employees They commit 80% of the crimes ranging from stealing SW, HW & other peripherals, computer fraud, proprietary information & time � Greatest threat from disgruntled employees. � Outside Users � Clients & other entities who do business with a company can gain access to info & use it to commit crimes. Hackers and Crackers Hackers – people who gain unauthorized access to computer system for fun & challenge � Crackers – people who gain unauthorized access for malicious purposes (for financial gain or to destroy data). � Organized Crime � Use computers for illegal activities such as counterfeiting.