mrs. stern computer applications ii. what is computer crime? criminals can operate anonymously over...

20
Cyber Safety Mrs. Stern Computer Applications II

Upload: clifton-hodge

Post on 12-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Cyber Safety Mrs. Stern

Computer Applications II

Page 2: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

What is Computer Crime?

Criminals Can Operate Anonymously Over the Computer Networks.

Be careful about talking to "strangers" on a computer network.

Page 3: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Remember that people online may

not be who they seem at first.

Who are these people anyway?

Page 4: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Never respond to messages or bulletin board items that are:

Suggestive of something improper or indecent;

Obscene, filthy, or offensive to accepted standards of decency;

Belligerent, hostile, combative, very aggressive; and

Threaten to do harm or danger towards you or another

Page 5: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

What should you do??Tell a grown-up right away

Do not give out any sensitive or personal information about you or your family in an Internet "chat room.“

Never arrange a face-to-face meeting without telling your parents or guardians.

Page 6: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

What is a Hacker??

A hacker is someone who breaks into computers sometimes to read private e-mails and other

files.

Page 7: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

What is your privacy worth?

What information about you or your parents do you think should be considered private?

medical information a diary your grades how much money your parents owe how much money your family has in a savings

account your letters to a friend.

Page 8: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

How is this invasion of privacy different?

Than someone breaking into: your school locker

your house to get this information about you and your family?

Page 9: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Hackers Destroy "Property"

In the Form of Computer Files or Records

They delete or alter files.

Page 10: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

How does it affect drug companies or local pharmacies?

What would happen if a hacker altered the chemical formulas for prescription drugs?

The flight patterns and other data in air traffic control computers?

Page 11: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Hackers Injure Computer Users

by Destroying Information Systems

Page 12: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Hackers cause victims:To spend time and money checking and

resecuring systems after break-in

Interrupt service

Steal telephone and computer time

Share unauthorized access codes and passwords

Page 13: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Who do you think pays for this?

$2 billion annually in telephone toll fraud alone.

Page 14: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Hackers are also responsible for:

Crashing computer systems causing them to malfunction and

not work

Page 15: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Computer “Pirates” Steal Intellectual Property

Intellectual property is the physical expression of ideas contained in:

BooksMusicPlaysMoviesComputer Software

Page 16: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

What are Copyrights? The legal right of ownership to the work

produced in books, music, plays, movies, graphics/pictures and computer software.

A copyrighted work cannot be copied without the permission from the owner of the copyright (author, writer or publisher).

Originally, copyright meant simply “the right to make copies of a given work.” Black's Law Dictionary (8th ed. 2004)

Page 17: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Copyright violations civil and criminal remedies

Civil remedy: copyright holder can sue infringer for money to cover loss of sales or other loss caused by infringement.

Criminal remedy: jail or fine paid to the government (not copyright holder) where person infringes a copyright for commercial advantage or private gain. For example, a person who makes multiple copies of a video, and sell the copies.

Page 18: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

How Can We Prevent Computer Crime?

Educating EveryoneUnderstand how technology can be used to

help or hurt others.what it would be like to be the victim of a

computer hacker or computer pirate.

Page 19: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

How Can We Prevent Computer Crime? (cont)

Practicing Safe Computing

Who has or may have access to my log-in address?

Computer hackers and pirates who hurt others through computer technology

They are breaking the law.

Page 20: Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking

Please go to the website below:http://www.cybercrime.gov/rules/kidinternet.htm