Maggottyhighcapeit.files.wordpress.com



Syllabus Focus: Unit 2 Module 3 Content 2Specific Objective 2: discuss various computer crimes;Content: Including propaganda; computer fraud, industrial sabotage; computer viruses; malware, electronic eavesdropping; cyber terrorism, hacking; identity theft, spoofing, phishing, hardware theft and vandalism, piracy, information theft, puter puter crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud (Taylor, 1999). A computer crime is often times a civil wrong but not always a criminal puter FraudComputer fraud covers a variety of activity that is harmful to people. Computer fraud is using the computer in some way to commit dishonesty by obtaining an advantage or causing loss of something of value. This could take form in a number of ways, including program fraud, hacking, e-mail hoaxes, auction and retail sales schemes, investment schemes and people claiming to be experts on subject areas. Students who may be committing a computer fraud or being taken advantage of by a person committing computer fraud can easily be using school equipment when this takes place. That is why it is important for educators to have knowledge of this area of computer crime. PropagandaPropaganda is the dissemination of information aimed at influencing the opinions or behaviors of people. As opposed to impartially providing information, propaganda in its most basic sense, often presents information primarily in order to influence its audience. Propaganda often presents facts selectively (thus lying by omission) to encourage a particular synthesis, or gives loaded messages in order to produce an emotional rather than rational response to the information presented. The desired result is a change of the attitude toward the subject in the target audience to further a political agenda.Industrial sabotageSabotage or the threat of sabotage is a central determinant of the balance of power in contemporary organizations. Throughout the history of industry and commerce, it has been used as a weapon by those with less formal power and has been practised and refined as an art of resistance. It has been discussed widely, but has been the subject of only a few comprehensive and sustained studies. Loose definitions of the concept predominate. It is defined here as deliberate action or inaction that is intended to damage, destroy or disrupt some aspect of the workplace environment, including the property, product, processes or reputation of the organization.In contrast to the image of the 'mad saboteur', careful review of existing research leads to the conclusion that most acts of sabotage are highly symbolic, are restrained and selective, are the product of collective or even conspiratorial efforts, and are performed with technical sophistication. They tend to be deliberate and calculated rather than impulsive and careless.Some level of workplace sabotage corresponds to the class-based organization of society and its associated distribution of advantages and disadvantages. This is compounded in effect due to issues of gender, race and ethnicity and other social barriers that exist. However, these macro conditions for sabotage do not fully explain its occurrence. It is also necessary to consider micro factors that manifest themselves in organizational and occupational settings, such as lack of control and exposure to systematic injustices. Simple desires for fun are sometimes considered as motives for destructive behaviour but such acts are not properly defined as sabotage.The contemporary and future importance of sabotage are hard to deny. It is therefore time for theorists of organizational behaviour and management to make a sustained effort to understand it.John M. Jermier & Walter Nord MalwareMalware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true virusesCyber terrorismAn act of terrorism committed through the use of cyber space or computer resources. According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."Unlike a nuisance?virus?or computer attack that results in a?denial of service?(DoS), the FBI defines a cyberterrorist attack as explicitly designed to cause physical harm to individuals. According to the U.S. Commission of Critical Infrastructure Protection, possible cyberterrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems. However, there is no current consensus between various governments and the information security community on what qualifies as an act of cyberterrorism. ()HackingHacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes. ()Identity theft Is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits? The term is relatively new and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions. In many countries specific laws make it a crime to use another person's identity for personal gain.Identity theft is somewhat different from identity fraud, which is related to the usage of a 'false identity' to commit fraud. Identity theft means impersonating a real personSpoofing attack is a situation in which one person or program successfully masquerades (act like) as another by falsifying data and thereby gaining an illegitimate advantage.E-mail spoofing is a term used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message.Phishing Is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication? Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing, probably influenced by phreaking, and alludes to baits used to "catch" financial information and passwords.Hardware TheftHardware theft is the act of stealing computer equipment. When you physically move a piece of hardware equipment without authorization.The act of defacing or destroying computer equipments is known as hardware vandalism.A method of theft protection for computers and computer related hardware. Warranty fraud, theft of proprietary technology, and hardware theft are minimized by encoding the hardware components such that a digitally authenticated handshake must be performed between the system and the component at power-up. If the handshake is successful, normal operation continues with all enhancements. If the handshake is unsuccessful, the device is disabled or shifted into a lower performance mode.Piracy Piracy is a war-like act committed by a non-state actor, especially robbery or criminal violence committed at sea, on a river, or sometimes on shore. It does not normally include crimes on board a vessel among passengers or crew. The term has been used to refer to raids across land borders by no state actors. Piracy should be distinguished from privateering, which was a legitimate form of war-like activity by no state actors, authorized by their national authorities, until this form of commerce raiding was outlawed in the 19th centuryInformation theftSome criminals use the Internet or other computer networks to break into a particular computer system in order to access forbidden information or to cause some damage. Such users also are called hackers. Many companies and organizations that have networked computers use various security measures, such as computers serving as firewalls, to protect their computers…SpamSpam is the abuse of electronic messaging systems (including most broadcast mediums, digital delivery systems) to send unsolicited bulk messages indiscriminately ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download