Upload
deborahlee7
View
222
Download
0
Embed Size (px)
Citation preview
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 1/10
2ND TERM COMPUTER ASSESSMENT
COMPUTER CRIME
NAME: NUR ALINA AISYA
FORM: 3 TERATAI
TEACHER: MS MAHSURI
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 2/10
DEFINITION OF COMPUTER CRIME
Computer crime or cybercrime is a form of crimewhere the Internet or computers are used as a
medium to commit crime. Issues surrounding this
type of crime have become high-profile, particularlythose surrounding hacking, copyright infringement,child pornography, and child grooming.
Examples of crimes that merely use computer
networks or devices would include:
Cyberstalking
Fraud and identity theft
Information warfare Phishing scams
CYBER TERRORISM
Cyber terrorism in general, can be defined as an act of terrorism committed
through the use of cyberspace or computer resources As such, a simple
propaganda in the Internet, that there will be bomb attacks during the holidays
can be considered cyberterrorism. As well there are also hacking activitiesdirected towards individuals, families, organized by groups within networks,
tending to cause fear among people, demonstrate power, collecting information
relevant for ruining peoples' lives, robberies, blackmailing etc.
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 3/10
HACKING
Use a computer to gain unauthorized access to data in a system. Unlike
most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more
difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer -based property such as files, web pages or software. The impact of computer
hacking varies from simply being simply invasive and annoying to illegal.There is an aura of mystery that surrounds hacking,and a prestige thataccompanies being part of a relatively "elite" group of individuals who
possess technological savvy and are willing to take the risks required to become a true "hacker"
A HACKER 1. A person who enjoys exploring the details of programmable systems and
how to stretch their capabilities, as opposed to most users, who prefer tolearn only the minimum necessary.
2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
3. A person capable of appreciating hack value.
4. A person who is good at programming quickly.5. An expert at a particular program, or one who frequently does work using
it or on it.
6. An expert or enthusiast of any kind. One might be an astronomy hacker,for example.
7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
8. [deprecated] A malicious meddler who tries to discover sensitiveinformation by poking around. Hence 'password hacker', 'network hacker'.The correct term for this sense is cracker.
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 4/10
SPAMMING
Electronic junk mail or junk newsgroup postings. Some people define spam
even more generally as any unsolicited e-mail. However, if a long-lost brother
finds your e-mail address and sends you a message, this could hardly be called
spam, even though it's unsolicited. Real spam is generally e-mail advertising for
some product sent to a mailing list or newsgroup.
In addition to wasting people's time with unwanted e-mail, spam also eats up a
lot of network bandwidth. Consequently, there are many organizations, as well
as individuals, who have taken it upon themselves to fight spam with a variety
of techniques. But because the Internet is public, there is really little that can be
done to prevent spam, just as it is impossible to prevent junk mail. However,
some online services have instituted policies to prevent spammers from
spamming their subscribers.
Spamming remains economically viable
because advertisers have no operating costs
beyond the management of their mailing
lists, and it is difficult to hold senders
accountable for their mass mailings. Because
the barrier to entry is so low, spammers are
numerous, and the volume of unsolicited
mail has become very high. In the year 2011,the estimated figure for spam messages is
around seven trillion. The costs, such as lost
productivity and fraud, are borne by the
public and by Internet service providers,
which have been forced to add extra capacity
to cope with the deluge. Spamming has been
the subject of legislation in many
jurisdictions.
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 5/10
EMAIL OFFENSIVE
Email offensive is unwanted emails that are sent by a contact of yours. It comesin many forms, such as innappropriate pictures and such. Junk mail is a more pervasive problem and very real, but is nowhere nearly as offensive as a
harassing email of any sort.
In the "real world" you can throw the junk mail away, write the junk mail sender and ask to be taken off the mailing list, or if nothing else works, you can file a
complaint with your local police or the government. For sexual harassment, you
can file a complaint with your company, local police or the government.
WHAT TO DO TO DEFEND YOURSELF?
1. Do not respond. It will only encourage more email.2. If it's just junk and you don't want to waste your time, delete it.
3. If the email is offensive or if you're tired of junk, forward the offensivemail to the senders ISP's contact:
4. If the host domain name is a "vanity" or sub-domain and is controlling itsown email addresses, the offensive mail can still be forwarded tothe real ISP for resolution:
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 6/10
CHILD PORNOGRAPHY
Child pornography has different legal definitions in different countries. The
minimum defines child pornography as an image showing a person who is achild and who is engaged in or is depicted as being engaged in explicit sexual
activity.
In addition, in some countries knowingly possessing child pornography is also a
criminal offence (such as in Spain). Sometimes thedefinition of child pornography includes computer
generated or altered images (morphed images).Sometimes it includes cartoon characters. The
requirement for the image (text, etc) to show a child
engaged in explicit sexual activity has created somedifficult problems in relation to pictures of children being abused but with no sexual activity involved.
The term child pornography usually means works that
center around sexual behaviour of children. Because production of child pornography is a crime in many jurisdictions, the decision on what constitutes itoften needs to be done in each separate case by experts, judges or community
members. Because the laws and community standards vary greatly, there is noconsensus on precise definitions of pornographyand child, which results in
further confusion.
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 7/10
SENDING VIRUSES
The common term "computer virus" is often used to refer to all malware(malicious software) that is, programs such as viruses, worms, and Trojan horses
that infect and destroy computer files. Technically speaking, virus es are self-
replicating programs that insert themselves into other computer files. The virusis spread when the file is transferred to another computer via a disk or by way of
the Internet.People have all sorts of reasons for creating and sending viruses. Some viruses
are written as pranks. Others are written by political activists or terrorists. Stillother viruses are intended to injure specific corporations. According to McAfee,one of the largest makers of anti-virus programs, in October 2004 more than
780,000 computers became infected with the top ten most prevalent viruses.WildList Organization International, an organization that tracks the number of
computer viruses circulating around the world, reported that there were roughly
360 viruses in play in October 2004.
Viruses behave in a number of different ways. The Netsky virus, for instance, istypically hidden in an e-mail attachment and is launched when the user opened
the attachment. Once active, Netsky set up its own e -mail protocol, looked for e-mail accounts on the hard drive, and mass -mailed itself to these accounts.Another virus named MSBlaster appeared on August 13th, 2003, and quickly
wormed its way through the Internet, infecting hundreds of thousands of computers in a day through vulnerability in Windows operating systems.
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 8/10
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 9/10
8/6/2019 2nd Term Computer Assessment
http://slidepdf.com/reader/full/2nd-term-computer-assessment 10/10