SlideShare a Scribd company logo
Objectives List measures to protect data from unauthorised access List precautions against virus attacks State examples of computer crimes List measures to prevent computer crimes
4.1 Protecting Data Some data is important and must be protected Computers used more and more More data digitalised Computers being networked Better accessibility to users … …  and criminals!
4.1 Protecting Data Data Espionage: Identity Theft In the past, identity data mainly stored in paper or card form Identity thieves had to be physically present to steal it Identity data is now digitally stored and shared Theft can be carried out over connected the Internet!
4.1 Protecting Data DoS (Denial-of-Service) Attack A massive attack Send a flood of data packages to a target system Bring systems or entire networks to a stand-still Carried out externally using Trojans or backdoor programs
4.1 Protecting Data
4.1 Protecting Data To ensure the security of data transfer Fix identity of a user Unique identification, systems, applications, services and resources
4.2 Theft of Computers Stealing computers Effective way to steal data Jacking Difficult to cut open secured ATMs ATMs are located in busy area Impossible to cut ATMs open without attracting attention
4.2 Theft of Computers Solutions to theft of computers Safety doors and alarm systems
4.3 Malicious Programs Programs that are designed with ill intentions Types: Viruses, worms and Trojan Horses A Trojan Horse allows others to control your computer by creating a “backdoor” Names: NetBus and Back Orifice Can use your computer to attack other computers.
4.3 Malicious Programs Precaution against Malicious Programs Install anti-virus and update software
4.3 Malicious Programs Precaution against Malicious Programs (Cont’d) Back up data regularly If you suspect that your computer has been infected Disconnect your computer from the network and the Internet Search the Internet with another computer for solutions to remove the malicious program
4.3 Malicious Programs Identity theft.  Encryption. Denial-of-Service attack.  Install and update anti-virus programs. Programs that are designed with ill intentions.  Anti-virus software, regular data back-ups etc.
4.4 Firewall A firewall A program Controls  Access to your computer from the network Which programs from your computer can access the network
A program that scans your computer and seeks to remove any viruses present.  It also stops viruses from being installed and activated. A program that controls access to/ from your computer from/ to the network 4.4 Firewall
4.4 Firewall A firewall (Cont’d) Complements anti-virus software Alerts you of possible intrusion
4.5 Protecting Your Data from Unauthorised    Access How do you to prevent these situations?
4.5 Protecting Your Data from Unauthorised Access Passwords Most common form of protection against unauthorised data access BIOS password Stored on the motherboard Another layer to the security Easily bypassed by removing the BIOS battery
4.5 Protecting Your Data from Unauthorised Access
4.5 Protecting Your Data from  Unauthorised Access Passwords (Cont’d) Screensaver password Screensaver activated after a period of inactivity A password is needed to resume work
4.5 Protecting Your Data from Unauthorised    Access Encryption Complements password protection Encrypt highly confidential data especially Makes it difficult for anyone to try to read your data Important when using the Internet because your data can be accessible
Keep your PC under lock and key.  Install safety locks, alarm systems etc. Password, data encryption etc. 4.5 Protecting Your Data from Unauthorised Access
4.6 Hijacked/Misused Internet Accounts Prevention measures Change passwords frequently Avoid using simple passwords Do not share passwords Internet accounts can be hijacked if others get to know your account name and password
4.7 Computer Crimes Computer crimes Acts performed using computers that Goes against the laws in a country Is the Internet Anonymous? People act irresponsibly on the Internet because they thought that nobody knows who they are But their identity on the Internet can be traced
4.7 Computer Crimes Laws governing computer usage cover the following: Illegal or offensive material Child pornography Criminally racist material Hacking, cracking and other computer crimes Offensive e-mails Pirated software
4.7 Computer Crimes Many international organisations formed to tackle computer crimes
4.7 Computer Crimes An industry that produces programs to combat computer crimes has arisen
4.7 Computer Crimes The laws in different countries Laws governing computer acts vary among countries New laws are being enacted to deal with new situations
4.7 Computer Crimes Are computer crimes a serious threat? Computers are heavily relied upon By businesses  In many critical areas Many disruptions if computers are not in order Computer crimes can spread at a very fast rate Financial losses from computer crimes are very high
   Cracking    Pirated software    Child pornography 2   Heavy reliance on computers for critical functions,    Fast proliferation of computer crimes    High financial losses 4.7 Computer Crimes
Summary Security is important because some files contain confidential information.  The loss or leakage of information may cause an organisation to lose a lot of money. To prevent PCs from being stolen, we can use a drive lock. Important data can be stored in an external hard disk that is kept away from your PC.
Summary Viruses, worms and Trojan Horses are types of malicious programs.  4.To protect against malicious viruses, install anti-virus programs. Also, back up important data regularly. A firewall can also help to detect viruses that might have escaped detection by the anti-virus software. 5. To prevent physical unauthorised access, use passwords such as a BIOS password and a screensaver password.
Summary Hacking and cracking are examples of computer crime. Crackers gain unauthorised access to a computer network to view, steal and even delete files. To prevent unauthorised access from the Internet, use a firewall.
Summary Apart from bringing convenience such as Internet banking and e-commerce, the Internet has become a tool for crime. We should be careful when giving out personal information, including credit card information, logins and passwords. Change passwords frequently and do not share passwords.

More Related Content

PPTX
Security and ethical challenges
PPT
Computer Network Security
PPTX
Computer Security
PPTX
Threats to Information Resources - MIS - Shimna
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
DOCX
Computer security and privacy
PPTX
Computer Security 101
PPT
3e - Security And Privacy
Security and ethical challenges
Computer Network Security
Computer Security
Threats to Information Resources - MIS - Shimna
Phishing, Pharming, and the latest potholes on the Information Highway
Computer security and privacy
Computer Security 101
3e - Security And Privacy

What's hot (20)

PPT
System vulnerability and abuse
PPT
BASIC IT AND CYBER SECURITY AWARENESS
PPTX
Computer security and
PPTX
Introduction to information security field
PPT
Threats to an information system
PPTX
Threats to information security
PPTX
Bryley - mobility in the work place
PPTX
Information Security Awareness Training Open
PPTX
Netiquette
PDF
Document Security
PDF
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
DOC
Computer Secutity.
PPTX
4.2.1 computer security risks
PPT
Computer security
PPT
Security And Ethical Challenges
PPTX
Cyber privacy and password protection
PPT
Computer security
PPTX
Computer security risks
PPT
091005 Internet Security
System vulnerability and abuse
BASIC IT AND CYBER SECURITY AWARENESS
Computer security and
Introduction to information security field
Threats to an information system
Threats to information security
Bryley - mobility in the work place
Information Security Awareness Training Open
Netiquette
Document Security
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
Computer Secutity.
4.2.1 computer security risks
Computer security
Security And Ethical Challenges
Cyber privacy and password protection
Computer security
Computer security risks
091005 Internet Security
Ad

Viewers also liked (11)

PPTX
Computer crime
PPT
Hate crimes
PPT
Communal conflicts in Nigeria
PPTX
Cyber crimes and its security
PPTX
Computer crime
PPTX
Cyber crime types & laws
PPTX
Security threats
PPTX
Types Of Computer Crime
PDF
Computer Security Threats
PPTX
Cybercrime.ppt
PPTX
Cyber crime ppt
Computer crime
Hate crimes
Communal conflicts in Nigeria
Cyber crimes and its security
Computer crime
Cyber crime types & laws
Security threats
Types Of Computer Crime
Computer Security Threats
Cybercrime.ppt
Cyber crime ppt
Ad

Similar to COB4 Computer Crime (20)

PPTX
Chapter 5.pptx
PPT
css ppt.ppt
PPTX
BCE L-3omputer security Basics.pptx
PPT
3e - Computer Crime
PPTX
Cyber crime , threats and their security measures
DOCX
Information Technology, cybersecurity and protection.docx
PDF
security By ZAK
PPT
Security and privacy
PPTX
Chap11
PPT
Chap11
PDF
Notacd02
PPT
Security and privacy
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
PPT
Computer crime
PPTX
CYBER CRIME AWARENESS (Thematic Presentation)
PPT
9. Computer Ethics.ppt
PPT
Computer
PPTX
Introduction to Information Security
Chapter 5.pptx
css ppt.ppt
BCE L-3omputer security Basics.pptx
3e - Computer Crime
Cyber crime , threats and their security measures
Information Technology, cybersecurity and protection.docx
security By ZAK
Security and privacy
Chap11
Chap11
Notacd02
Security and privacy
Class 11 ca chapter 17 computer ethics and cyber crime
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
Computer crime
CYBER CRIME AWARENESS (Thematic Presentation)
9. Computer Ethics.ppt
Computer
Introduction to Information Security

More from angbeelee (20)

PPT
VIE - Metaphors
PPT
VIE on Similes 2014
PPT
VIE on Similes 2014
PPT
VIE on Similes 2014
PPT
VIE on Similes 2014
PPTX
VIEs on Irony
PPTX
VIEs on Proverbs
PPTX
VIEs on Puns
PPT
VIEs on Oxymorons
PPTX
VIEs on Hyperbole
PPTX
VIEs on Personification
PPTX
VIEs on Personification
PPTX
Vi es on metaphors
PPT
VIEs on similes
PPTX
Flash fiction writing contest
PPTX
Flash fiction writing contest
PPT
VIEs on Mass Media
PPTX
VIEs on Technology
PPTX
VIEs on Technology
PPT
VIEs - Sports
VIE - Metaphors
VIE on Similes 2014
VIE on Similes 2014
VIE on Similes 2014
VIE on Similes 2014
VIEs on Irony
VIEs on Proverbs
VIEs on Puns
VIEs on Oxymorons
VIEs on Hyperbole
VIEs on Personification
VIEs on Personification
Vi es on metaphors
VIEs on similes
Flash fiction writing contest
Flash fiction writing contest
VIEs on Mass Media
VIEs on Technology
VIEs on Technology
VIEs - Sports

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
GDM (1) (1).pptx small presentation for students
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Pre independence Education in Inndia.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Insiders guide to clinical Medicine.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharmacology of Heart Failure /Pharmacotherapy of CHF
GDM (1) (1).pptx small presentation for students
2.FourierTransform-ShortQuestionswithAnswers.pdf
RMMM.pdf make it easy to upload and study
Pre independence Education in Inndia.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Insiders guide to clinical Medicine.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharma ospi slides which help in ospi learning
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.

COB4 Computer Crime

  • 1. Objectives List measures to protect data from unauthorised access List precautions against virus attacks State examples of computer crimes List measures to prevent computer crimes
  • 2. 4.1 Protecting Data Some data is important and must be protected Computers used more and more More data digitalised Computers being networked Better accessibility to users … … and criminals!
  • 3. 4.1 Protecting Data Data Espionage: Identity Theft In the past, identity data mainly stored in paper or card form Identity thieves had to be physically present to steal it Identity data is now digitally stored and shared Theft can be carried out over connected the Internet!
  • 4. 4.1 Protecting Data DoS (Denial-of-Service) Attack A massive attack Send a flood of data packages to a target system Bring systems or entire networks to a stand-still Carried out externally using Trojans or backdoor programs
  • 6. 4.1 Protecting Data To ensure the security of data transfer Fix identity of a user Unique identification, systems, applications, services and resources
  • 7. 4.2 Theft of Computers Stealing computers Effective way to steal data Jacking Difficult to cut open secured ATMs ATMs are located in busy area Impossible to cut ATMs open without attracting attention
  • 8. 4.2 Theft of Computers Solutions to theft of computers Safety doors and alarm systems
  • 9. 4.3 Malicious Programs Programs that are designed with ill intentions Types: Viruses, worms and Trojan Horses A Trojan Horse allows others to control your computer by creating a “backdoor” Names: NetBus and Back Orifice Can use your computer to attack other computers.
  • 10. 4.3 Malicious Programs Precaution against Malicious Programs Install anti-virus and update software
  • 11. 4.3 Malicious Programs Precaution against Malicious Programs (Cont’d) Back up data regularly If you suspect that your computer has been infected Disconnect your computer from the network and the Internet Search the Internet with another computer for solutions to remove the malicious program
  • 12. 4.3 Malicious Programs Identity theft. Encryption. Denial-of-Service attack. Install and update anti-virus programs. Programs that are designed with ill intentions. Anti-virus software, regular data back-ups etc.
  • 13. 4.4 Firewall A firewall A program Controls Access to your computer from the network Which programs from your computer can access the network
  • 14. A program that scans your computer and seeks to remove any viruses present. It also stops viruses from being installed and activated. A program that controls access to/ from your computer from/ to the network 4.4 Firewall
  • 15. 4.4 Firewall A firewall (Cont’d) Complements anti-virus software Alerts you of possible intrusion
  • 16. 4.5 Protecting Your Data from Unauthorised Access How do you to prevent these situations?
  • 17. 4.5 Protecting Your Data from Unauthorised Access Passwords Most common form of protection against unauthorised data access BIOS password Stored on the motherboard Another layer to the security Easily bypassed by removing the BIOS battery
  • 18. 4.5 Protecting Your Data from Unauthorised Access
  • 19. 4.5 Protecting Your Data from Unauthorised Access Passwords (Cont’d) Screensaver password Screensaver activated after a period of inactivity A password is needed to resume work
  • 20. 4.5 Protecting Your Data from Unauthorised Access Encryption Complements password protection Encrypt highly confidential data especially Makes it difficult for anyone to try to read your data Important when using the Internet because your data can be accessible
  • 21. Keep your PC under lock and key. Install safety locks, alarm systems etc. Password, data encryption etc. 4.5 Protecting Your Data from Unauthorised Access
  • 22. 4.6 Hijacked/Misused Internet Accounts Prevention measures Change passwords frequently Avoid using simple passwords Do not share passwords Internet accounts can be hijacked if others get to know your account name and password
  • 23. 4.7 Computer Crimes Computer crimes Acts performed using computers that Goes against the laws in a country Is the Internet Anonymous? People act irresponsibly on the Internet because they thought that nobody knows who they are But their identity on the Internet can be traced
  • 24. 4.7 Computer Crimes Laws governing computer usage cover the following: Illegal or offensive material Child pornography Criminally racist material Hacking, cracking and other computer crimes Offensive e-mails Pirated software
  • 25. 4.7 Computer Crimes Many international organisations formed to tackle computer crimes
  • 26. 4.7 Computer Crimes An industry that produces programs to combat computer crimes has arisen
  • 27. 4.7 Computer Crimes The laws in different countries Laws governing computer acts vary among countries New laws are being enacted to deal with new situations
  • 28. 4.7 Computer Crimes Are computer crimes a serious threat? Computers are heavily relied upon By businesses In many critical areas Many disruptions if computers are not in order Computer crimes can spread at a very fast rate Financial losses from computer crimes are very high
  • 29. Cracking  Pirated software  Child pornography 2  Heavy reliance on computers for critical functions,  Fast proliferation of computer crimes  High financial losses 4.7 Computer Crimes
  • 30. Summary Security is important because some files contain confidential information. The loss or leakage of information may cause an organisation to lose a lot of money. To prevent PCs from being stolen, we can use a drive lock. Important data can be stored in an external hard disk that is kept away from your PC.
  • 31. Summary Viruses, worms and Trojan Horses are types of malicious programs. 4.To protect against malicious viruses, install anti-virus programs. Also, back up important data regularly. A firewall can also help to detect viruses that might have escaped detection by the anti-virus software. 5. To prevent physical unauthorised access, use passwords such as a BIOS password and a screensaver password.
  • 32. Summary Hacking and cracking are examples of computer crime. Crackers gain unauthorised access to a computer network to view, steal and even delete files. To prevent unauthorised access from the Internet, use a firewall.
  • 33. Summary Apart from bringing convenience such as Internet banking and e-commerce, the Internet has become a tool for crime. We should be careful when giving out personal information, including credit card information, logins and passwords. Change passwords frequently and do not share passwords.