10
 2ND TERM COMPUTER ASSESSMENT COMPUTER CRIME  NAME: NUR ALINA AISYA FORM: 3 TERATAI TEACHER: MS MAHSURI

2nd Term Computer Assessment

Embed Size (px)

Citation preview

Page 1: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 1/10

 

2ND TERM COMPUTER ASSESSMENT

COMPUTER CRIME

 NAME: NUR ALINA AISYA

FORM: 3 TERATAI

TEACHER: MS MAHSURI

Page 2: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 2/10

DEFINITION OF COMPUTER CRIME

Computer crime or cybercrime is a form of crimewhere the Internet or computers are used as a

medium to commit crime. Issues surrounding this

type of crime have become high-profile, particularlythose surrounding hacking, copyright infringement,child pornography, and child grooming.

Examples of crimes that merely use computer 

networks or devices would include:

  Cyberstalking

  Fraud and identity theft

  Information warfare  Phishing scams

CYBER TERRORISM

Cyber terrorism in general, can be defined as an act of terrorism committed

through the use of cyberspace or computer resources As such, a simple

 propaganda in the Internet, that there will be bomb attacks during the holidays

can be considered cyberterrorism. As well there are also hacking activitiesdirected towards individuals, families, organized by groups within networks,

tending to cause fear among people, demonstrate power, collecting information

relevant for ruining peoples' lives, robberies, blackmailing etc.

Page 3: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 3/10

HACKING

Use a computer to gain unauthorized access to data in a system. Unlike

most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more

difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer -based  property such as files, web pages or software. The impact of computer 

hacking varies from simply being simply invasive and annoying to illegal.There is an aura of mystery that surrounds hacking,and a prestige thataccompanies being part of a relatively "elite" group of individuals who

  possess technological savvy and are willing to take the risks required to become a true "hacker"

A HACKER 1.  A person who enjoys exploring the details of programmable systems and

how to stretch their capabilities, as opposed to most users, who prefer tolearn only the minimum necessary.

2.  One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

3.  A person capable of appreciating hack value.

4.  A person who is good at programming quickly.5.  An expert at a particular program, or one who frequently does work using

it or on it.

6.  An expert or enthusiast of any kind. One might be an astronomy hacker,for example.

7.  One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8.  [deprecated] A malicious meddler who tries to discover sensitiveinformation by poking around. Hence 'password hacker', 'network hacker'.The correct term for this sense is cracker.

Page 4: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 4/10

SPAMMING

Electronic junk mail or junk newsgroup postings. Some people define spam

even more generally as any unsolicited e-mail. However, if a long-lost brother 

finds your e-mail address and sends you a message, this could hardly be called

spam, even though it's unsolicited. Real spam is generally e-mail advertising for 

some product sent to a mailing list or newsgroup.

In addition to wasting people's time with unwanted e-mail, spam also eats up a

lot of network bandwidth. Consequently, there are many organizations, as well

as individuals, who have taken it upon themselves to fight spam with a variety

of techniques. But because the Internet is public, there is really little that can be

done to prevent spam, just as it is impossible to prevent junk mail. However,

some online services have instituted policies to prevent spammers from

spamming their subscribers.

Spamming remains economically viable

 because advertisers have no operating costs

  beyond the management of their mailing

lists, and it is difficult to hold senders

accountable for their mass mailings. Because

the barrier to entry is so low, spammers are

numerous, and the volume of unsolicited

mail has become very high. In the year 2011,the estimated figure for spam messages is

around seven trillion. The costs, such as lost

  productivity and fraud, are borne by the

  public and by Internet service providers,

which have been forced to add extra capacity

to cope with the deluge. Spamming has been

the subject of legislation in many

 jurisdictions.

Page 5: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 5/10

EMAIL OFFENSIVE

Email offensive is unwanted emails that are sent by a contact of yours. It comesin many forms, such as innappropriate pictures and such. Junk mail is a more  pervasive problem and very real, but is nowhere nearly as offensive as a

harassing email of any sort.

In the "real world" you can throw the junk mail away, write the junk mail sender and ask to be taken off the mailing list, or if nothing else works, you can file a

complaint with your local police or the government. For sexual harassment, you

can file a complaint with your company, local police or the government.

WHAT TO DO TO DEFEND YOURSELF?

1.  Do not respond. It will only encourage more email.2.  If it's just junk and you don't want to waste your time, delete it.

3.  If the email is offensive or if you're tired of junk, forward the offensivemail to the senders ISP's contact:

4.  If the host domain name is a "vanity" or sub-domain and is controlling itsown email addresses, the offensive mail can still be forwarded tothe real ISP for resolution:

Page 6: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 6/10

 

CHILD PORNOGRAPHY

Child pornography has different legal definitions in different countries. The

minimum defines child pornography as an image showing a person who is achild and who is engaged in or is depicted as being engaged in explicit sexual

activity.

In addition, in some countries knowingly possessing child pornography is also a

criminal offence (such as in Spain). Sometimes thedefinition of child pornography includes computer 

generated or altered images (morphed images).Sometimes it includes cartoon characters. The

requirement for the image (text, etc) to show a child

engaged in explicit sexual activity has created somedifficult problems in relation to pictures of children being abused but with no sexual activity involved.

The term child pornography usually means works that

center around sexual behaviour of children. Because production of child pornography is a crime in many jurisdictions, the decision on what constitutes itoften needs to be done in each separate case by experts, judges or community

members. Because the laws and community standards vary greatly, there is noconsensus on precise definitions of pornographyand child, which results in

further confusion.

Page 7: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 7/10

SENDING VIRUSES

The common term "computer virus" is often used to refer to all malware(malicious software) that is, programs such as viruses, worms, and Trojan horses

that infect and destroy computer files. Technically speaking, virus es are self-

replicating programs that insert themselves into other computer files. The virusis spread when the file is transferred to another computer via a disk or by way of 

the Internet.People have all sorts of reasons for creating and sending viruses. Some viruses

are written as pranks. Others are written by political activists or terrorists. Stillother viruses are intended to injure specific corporations. According to McAfee,one of the largest makers of anti-virus programs, in October 2004 more than

780,000 computers became infected with the top ten most prevalent viruses.WildList Organization International, an organization that tracks the number of 

computer viruses circulating around the world, reported that there were roughly

360 viruses in play in October 2004.

Viruses behave in a number of different ways. The Netsky virus, for instance, istypically hidden in an e-mail attachment and is launched when the user opened

the attachment. Once active, Netsky set up its own e -mail protocol, looked for e-mail accounts on the hard drive, and mass -mailed itself to these accounts.Another virus named MSBlaster appeared on August 13th, 2003, and quickly

wormed its way through the Internet, infecting hundreds of thousands of computers in a day through vulnerability in Windows operating systems.

Page 8: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 8/10

 

Page 9: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 9/10

 

Page 10: 2nd Term Computer Assessment

8/6/2019 2nd Term Computer Assessment

http://slidepdf.com/reader/full/2nd-term-computer-assessment 10/10