1 / 0

Computer Crime

Computer Crime. Shaqaliah Bryan Grade: 11A Brittany Dewdney Tchakamau Ra Leah Rerrie Taylor Tenn. Identity Theft. This is the type of fraud where someone deliberately takes on another person’s identity without his/her knowledge. .

jaron
Download Presentation

Computer Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crime

    ShaqaliahBryan Grade: 11A Brittany Dewdney Tchakamau Ra Leah Rerrie Taylor Tenn
  2. Identity Theft This is the type of fraud where someone deliberately takes on another person’s identity without his/her knowledge.
  3. This is done when someone is able to obtain proof of your identity e.g. your credit card number, account password or pin code. This can be done by observing users as they type in their login credentials etc. into IT equipments in public, impersonating trusted organizations that would store and process large amounts of personal data, among many other techniques.
  4. Industrial Espionage Some organizations try to gain an advantage over their competitors by illicitly gaining access to information about their marketing strategy, latest research, expansion plans and so on. Industrial espionage is when secret information is obtained by spying on competitors or opponents. This is achieved by hacking into organisational databases and viewing the information they contain. This can be done more easily if the hackers have accomplices working within the organisation.
  5. Credit card fraud is a wide ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purposes of credit card fraud range from obtaining goods without paying to obtaining unauthorized funds from an account. Credit card fraud begins with either the theft of the physical card or the compromise of data associated with the account, including the card account number or other information that would routinely be available to a merchant during a legitimate transaction. Credit Card Fraud
  6. The mail and the internet are major routes for fraud against merchants who sell and ship products, and affects legitimate mail-order and internet merchants. If the card is not physically present the merchant must rely on the holder presenting the information indirectly, whether by mail, telephone or over the internet. Identity theft is as a result of credit card fraud and can be split into two categories: application fraud and account takeover.
  7. Application Fraud Account Takeover This occurs when criminals use stolen or fake documents to open an account in someone else’s name. Criminals may try to steal documents such as utility bills and bank statements to build up useful personal information. When a criminal tries to take over another person’s account, first by gathering information about the intended victim, and then contacting their card issuer while impersonating the genuine cardholder, and asking for mail to be redirected to a new address. The criminal then reports the card lost and asks for a replacement to be sent.
  8. Surveillance This involves the use of technology to ascertain information from the user and from the computer, often without the user’s knowledge. The computer-related activities of many people are often kept under surveillance. The information gathered through this surveillance may be used to develop profiles of several people. Surveillance is not only done by law-enforcement personnel, but many websites keep you under surveillance as well.
  9. In monitoring with utility software all data that passes through a network can be monitored. Data can also be monitored from a distance by using commercially available equipment which can receive and process the radiation emitted from a monitor. The data being displayed at the time can then be observed. Hardware devices such as a keystroke logger implanted in the keyboard can record all keystrokes made by the user. This device is then retrieved and so is the information. The disadvantage would be that physical entry to where computer is located is required. Without legal authorisation this can be seen as a legal offence. The implications of surveillance include lack of security, loss of the user’s privacy, potential misuse of information (possibly for monetary gain) among others. There are several techniques for surveillance, including monitoring software and hardware devices.
  10. Electronic Eavesdropping This is the use of electronic devices to monitor electronic communications between two or more groups without the permission of any of the communicating parties. Examples include e-mail, phone and fax. Some computers can be modified to intercept information being transferred in any electronic form along a communication channel e.g. telephone lines Some companies have a policy for all electronic communications to be monitored, however, there is a threat of invasion of privacy when this is done by unauthorised persons.
  11. Thus it is advised to avoid transmitting sensitive information to electronic form unless there is an encryption system in place to ensure that data is secure. If intercepted by the wrong persons, it is useless since the information is unreadable. The intended receiver will have the decryption key with which the data can be decoded and read.
  12. Storage of Inaccurate Information Whenever data is kept, the owner should ensure that it is accurate and correct. Storage of inaccurate data could result in negative effects on the individuals and the organisations on which the data is stored. For example, in a credit rating system, if incorrect data on a consumer is stored, it could be damaging to the consumer, since it might prevent him/her from obtaining credit.
  13. The End.
More Related