mrs. stern computer applications ii. what is computer crime? criminals can operate anonymously over...

Post on 12-Jan-2016

212 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Safety Mrs. Stern

Computer Applications II

What is Computer Crime?

Criminals Can Operate Anonymously Over the Computer Networks.

Be careful about talking to "strangers" on a computer network.

Remember that people online may

not be who they seem at first.

Who are these people anyway?

Never respond to messages or bulletin board items that are:

Suggestive of something improper or indecent;

Obscene, filthy, or offensive to accepted standards of decency;

Belligerent, hostile, combative, very aggressive; and

Threaten to do harm or danger towards you or another

What should you do??Tell a grown-up right away

Do not give out any sensitive or personal information about you or your family in an Internet "chat room.“

Never arrange a face-to-face meeting without telling your parents or guardians.

What is a Hacker??

A hacker is someone who breaks into computers sometimes to read private e-mails and other

files.

What is your privacy worth?

What information about you or your parents do you think should be considered private?

medical information a diary your grades how much money your parents owe how much money your family has in a savings

account your letters to a friend.

How is this invasion of privacy different?

Than someone breaking into: your school locker

your house to get this information about you and your family?

Hackers Destroy "Property"

In the Form of Computer Files or Records

They delete or alter files.

How does it affect drug companies or local pharmacies?

What would happen if a hacker altered the chemical formulas for prescription drugs?

The flight patterns and other data in air traffic control computers?

Hackers Injure Computer Users

by Destroying Information Systems

Hackers cause victims:To spend time and money checking and

resecuring systems after break-in

Interrupt service

Steal telephone and computer time

Share unauthorized access codes and passwords

Who do you think pays for this?

$2 billion annually in telephone toll fraud alone.

Hackers are also responsible for:

Crashing computer systems causing them to malfunction and

not work

Computer “Pirates” Steal Intellectual Property

Intellectual property is the physical expression of ideas contained in:

BooksMusicPlaysMoviesComputer Software

What are Copyrights? The legal right of ownership to the work

produced in books, music, plays, movies, graphics/pictures and computer software.

A copyrighted work cannot be copied without the permission from the owner of the copyright (author, writer or publisher).

Originally, copyright meant simply “the right to make copies of a given work.” Black's Law Dictionary (8th ed. 2004)

Copyright violations civil and criminal remedies

Civil remedy: copyright holder can sue infringer for money to cover loss of sales or other loss caused by infringement.

Criminal remedy: jail or fine paid to the government (not copyright holder) where person infringes a copyright for commercial advantage or private gain. For example, a person who makes multiple copies of a video, and sell the copies.

How Can We Prevent Computer Crime?

Educating EveryoneUnderstand how technology can be used to

help or hurt others.what it would be like to be the victim of a

computer hacker or computer pirate.

How Can We Prevent Computer Crime? (cont)

Practicing Safe Computing

Who has or may have access to my log-in address?

Computer hackers and pirates who hurt others through computer technology

They are breaking the law.

Please go to the website below:http://www.cybercrime.gov/rules/kidinternet.htm

top related