Computer Crime and Cyber Security
Computer Crime and Cyber Security
COMPUTER CRIME
AND
CYBER SECURITY
By: TRAN Le Ngoc Khanh (Cally)
EMAIL
SCAMS
Lesson 1
Lesson 1
Email scams
What is crime?
Crime simply means illegal activities done by
somebody which can be punished by the
government.
There are many types of crimes that can be
done. Mainly, crimes can be considered as two
types: traditional crimes, which are murder;
robbery; rape; drug or human trafficking, and
cybercrime.
Part 1
In this part of the video, we will only focus on What is crime?
cybercrime.
What is cyber crime?
Lesson 1
Email scams
TYPES OF
EMAIL SCAMS
There are many types of email
scams, but here are the four most
common ones:
Phising
Trojan horse/Malware
Fraudulent requests for money
or advance fees (Advance fee Part 3
Types of email scams
fraud)
Virus-generated email
Phishing
Lesson 1
Email scams
What is phishing?
A phishing email is one that looks like a
legitimate email from companies sent
by phishers to get people reveal their
personal, financial and other sensitive
information.
How does phishing work?
Phishers send out thousands of phishing
emails, and for phishing to be
successful, the “victim”, or receiver, must Part 3
Types of email scams
click on the link in the email to go to a
website.
Phishing
Lesson 1
Email scams
Part 3
Types of email scams
Lesson 1
Email scams
Trojan horse/malware
email
What is Trojan horse email?
A Trojan horse email is an email that contains a link or attachment. When the
receiver clicks on the link or attachment, it will automatically and immediately
install a virus on their computers.
Effects of trojan horse email virus
Change, steal, destroy files or information on hard disks
Capture and resend confidential data to an external
address or communication ports
Record the receiver’s keystrokes and send them to
attackers Part 3
Types of email scams
Use the receiver’s device to spam people in their address
book
Lesson 1
Email scams
Trojan horse/malware
email
Example of
a trojan
horse email
with a
malicious
attachment.
Part 3
Types of email scams
Lesson 1 Virus-generated
email
Email scams
Example of a
virus-generated
email
Part 3
Types of email scams
Lesson 1
Email scams
How to protect ourselves
from email scams
Use a SPAM filter to
prevent any
common email
scams reaching your
mail box.
Always be alert and
suspicious! Never
click on any emails, Part 4
Protect from email scams
links or attachments.
HACKING
Lesson 2
Logic bombs
Lesson 2
Hacking
What is it?
A string of malicious code inserted intentionally in a
program that tells the computer to harm a network
when conditions, like specific time and date, is met.
Who uses logic bombs?
Logic bombs can be use by blackmailers or unhappy
employees that want to seek revenge.
Part 1
Logic bombs
Computer misuse act
Lesson 2
Hacking
businesses
Hacking
Lesson 2
Hacking
What is hacking?
Hacking is the act of identifying, exploiting weaknesses in a computer
system or network. This is then further aimed at gaining access to and
being able to modify personal or organizational data unauthorizedly.
Why do hackers hack?
For financial gain
Basic bragging rights
Revenge
Part 3
Challenge Hacking
organizations
Lesson 2
Hacking What is computer virus?
A virus is a type of malware
A computer virus can replicate by copying itself to another program, computer
boot sector or document without the user’s consent.
A computer virus can change the way in which a computer works.
A computer virus can be spread to another computer through emails or file
sharing.
Part 4
Malware
Lesson 2
Hacking
Types of common
malware
Browser hijacking
This is a malware that changes a browser’s behaviour, settings, or appearance
without the user’s consent. Also, this malware can redirect the user to websites
they haven’t intended to be in.
File infector virus
This is a computer virus that infects a particular file. It may completely or
partially overwrite the file. This virus can later spread itself to other executable
files and programs.
Macro virus
This virus is written in the same macro language as used in
the software program. This virus is embedded in the Part 4
Malware
template files, like Word or Excel, and will infect the
computer when this file is opened.
Signs of malware
Lesson 2
Hacking
Part 4
Malware
Lesson 2
Hacking How to avoid malware
Avoid clicking on everything, especially
ones that are too good to be true, both on
websites and emails
Don’t visit illegal sites, especially ones that
allow users to download copyright
materials
Install up-to-date antivirus and
antispyware software
Update the browser software regularly
Part 5
Make sure the browser is set to ask for Protecing
www.passwordmonster.com
PROTECTING
PERSONAL
DATA
Lesson 3
Lesson 3
Protecting personl data
Holding data
Who holds personal data about you?
School/Workplace
Doctor/Hospitals
Online organizations/websites/apps
What information can online organizations/website/apps, like Google, hold
about you?
Name
Birthday
All contact names and addresses
Types of mobile phones you're using Part 1
Holding data
tools.
Lesson 3
Protecting personl data
Ways to protect
personal identity
Destroy private records and statements,
like credit card statements
Secure the email
Don’t post photos taken at home
Turn off location sharing
Don't include personal data, like birth
date, adsress, phone number, in the
profile.
Be aware and change the privacy settings
Avoid using public wifi Part 3
Protecting
Invest in security softwares
COPYRIGHT
AND
PLAGIARISM
Lesson 4
Lesson 4
Copyright & Plagiarism
Copyright law
What is it?
Copyright law protects the
owner of a creative work from
having it illegally copied.
This is a copyright sign ©
This sign on a creative work
means that you are not allowed
to copy or redistribute it.
These creative work include fine
artwork, dance, writing, film- Part 1
Copyright law
making, and composition.
Lesson 4
Copyright & Plagiarism
Copyright and
personal use
It is completely okay to transfer a copy of a CD
you have bought onto your own computer hard
drive or portable music player.
As long as this is only for personal use, it is
totally fine.
However, it is never okay to sell or make a profit
of an unauthorized copy of copyright material.
If you do so, Internet service providers with your
computer’s IP address will send out advisory
letters. Part 2
Personal use
Lesson 4
Copyright & Plagiarism
Examples of copyright
infringements
When you make an mp3 copy of a song from a CD you bought that gives you
permission to do this, and share the mp3 copy on the Internet using a file-
sharing network, which millions of other millions of other people can
download it.
Even simpler, when you receive an email with a copy of a copyrighted song,
and you forward this email to all of your friends.
Part 3
Examples of copyright
Plagiarism
Lesson 4
Copyright & Plagiarism
What is it?
Plagiarism means copying someone
else’s work and presenting it as your
own. This could be ideas, words,
images, music, etc.
Plagiarism has a lot in common with
copyright infringement but it is not the
same thing.
In general terms, plagiarism is an ethical
issue and copyright infringement is a Part 4
Plagiarism
legal one.
Lesson 4
Copyright & Plagiarism
Detecting
plagiarism
Universities, publishers and other institutions use software to detect
plagiarism.
These software compares, for example, a student essay with millions of
online documents to check for a mark of similarity to any of the other work.
Part 5
Detect plagiarism
Lesson 4
Copyright & Plagiarism
Examples of
plagiarism
When you use a couple of
paragraphs of writing, without the
acknowledgement of the author,
from a book that is out of copyright,
in a short story submitted in a
competition you joined.
When you buy an essay or a project
from a website with permission to
use it, and submit it as your Part 6
Using computers for a long time will cause the following problems
to your health:
Back, neck, shoulder pain
Headache
Eyestrain
Repetitive Strain Injury (RSI) from repeating the same actions over and over
again
To avoid computer-related injuries:
We need to use proper furniture, work with better posture, and have good
working habits.
We should take regular breaks from using a computer Part 1
Health&computers
and should do some physical activities each day.
Lesson 5
Health & Safety
Health and safety
regulations
The law states that an employer must:
provide tiltable screens
provide anti-glare screen filter
provide adjustable chairs
provide foot supports
make sure lighting is suitable
make sure workstations are not cramped
plan work at a computer so that there
are frequent breaks
pay for appropriate eye and eyesight Part 2
Regulations
tests by an optician
Lesson 5
Health & Safety
A well-designed
environment
Proper lighting: Not too bright or
too dim
Reduce glare on the screen:
Make sure the lights aren’t
reflecting directly off your
screen
Take regular breaks: Stand,
stretch, or just look into the far
distance every
Part 4
15-20 minutes. Environment
Health and safety law
Lesson 5
Health & Safety
Part 6
Old computers
Lesson 5
Health & Safety
Environmental effects
of old computers
Environmental effects of old computers:
Hazardous waste
Hazardous materials in electronic devices can
leach into the earth and get into water
supplies.
Lighting these materials on fire will causes
pollution in the atmosphere
And because of this complexity, there are
laws governing safe disposal electronics, such
as The Waste Electric and Electronic Part 6
Old computers
Equipment (WEEE) Regulations 2013
Recycling option
Lesson 5
Health & Safety
drive.
ICT