0% found this document useful (0 votes)
30 views49 pages

Computer Crime and Cyber Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views49 pages

Computer Crime and Cyber Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

ICT

COMPUTER CRIME
AND
CYBER SECURITY
By: TRAN Le Ngoc Khanh (Cally)
EMAIL
SCAMS
Lesson 1
Lesson 1
Email scams
What is crime?
Crime simply means illegal activities done by
somebody which can be punished by the
government.
There are many types of crimes that can be
done. Mainly, crimes can be considered as two
types: traditional crimes, which are murder;
robbery; rape; drug or human trafficking, and
cybercrime.
Part 1
In this part of the video, we will only focus on What is crime?

cybercrime.
What is cyber crime?
Lesson 1
Email scams

Cybercrime, or computer crime, is any criminal activity that


is related to a computer, or a network, or networked
device.
Below are some interesting facts about cybercrime:
Cybercrime gives criminals more money than drug
trafficking.
Someone’s identity is stolen every 3 seconds because
of cybercrime.
Since COVID-19, the US FBI reported a 300% increase
in reported cybercime.
Cybercrime can be committed through email scams. And Part 2
What is cybercrime?
we will look further into different types of email scams.
Lesson 1
Email scams

TYPES OF
EMAIL SCAMS
There are many types of email
scams, but here are the four most
common ones:
Phising
Trojan horse/Malware
Fraudulent requests for money
or advance fees (Advance fee Part 3
Types of email scams
fraud)
Virus-generated email
Phishing
Lesson 1
Email scams

What is phishing?
A phishing email is one that looks like a
legitimate email from companies sent
by phishers to get people reveal their
personal, financial and other sensitive
information.
How does phishing work?
Phishers send out thousands of phishing
emails, and for phishing to be
successful, the “victim”, or receiver, must Part 3
Types of email scams
click on the link in the email to go to a
website.
Phishing
Lesson 1
Email scams

To stay away from phishing, look out for these signs:


Unusual greetings: The greetings is not personalized because the phishers don’t know
the receiver’s name.
Unusual/unknown/public domain or sender’s address: The email is from
public/mispelled/ or with an additional word domain.
Suspicious links or attachments: The link may look normal outside, but when hover over,
the link address is very weird and does not lead to the website mentioned.
Request for personal information: The email asks the receiver for personal information
that genuine organizations and companies never ask for.
Sense of urgency: The email say that there will be big consequences of the receiver
doesn’t do certain things immediately.
Part 3
Poor spelling and grammar: There will be many errors which Types of email scams

should not be seen in serious emails.


Phishing
Lesson 1
Email scams

Example of a phishing email:


Grammar and
punctuation errors
Unusual sender's address
Sense of urgency
Suspicious
attachment/button

Part 3
Types of email scams
Lesson 1
Email scams
Trojan horse/malware
email
What is Trojan horse email?
A Trojan horse email is an email that contains a link or attachment. When the
receiver clicks on the link or attachment, it will automatically and immediately
install a virus on their computers.
Effects of trojan horse email virus
Change, steal, destroy files or information on hard disks
Capture and resend confidential data to an external
address or communication ports
Record the receiver’s keystrokes and send them to
attackers Part 3
Types of email scams
Use the receiver’s device to spam people in their address
book
Lesson 1
Email scams
Trojan horse/malware
email
Example of
a trojan
horse email
with a
malicious
attachment.

When click on this attachment, a virus might be Part 3


Types of email scams
installed onto the device immediately.
Lesson 1 Advance fee
fraud
Email scams

What is advance fee fraud?


An advance fee fraud is a form of
fraud which tricks people to make
payment for goods, services, and/or
financial gains.
Signs to look out for advance fee fraud:
They often sound too good to be
true.
They’re long and sound as if the
Example of advance fee
sender is desperate for financial fraud
Part 3
Types of email scams
plea.
Lesson 1 Virus-generated
email
Email scams

What is a virus-generated email?


These emails often come from a friend.
This means that the friend’s email has been affected by a virus which sent the
email to everyone in the address book.
This email will contain some links or sites that are said to be recommendations
of a product or shop.
When click on the link, a virus might be downloaded or will lead to a selling-
fake-products website.
In addition, the email’s content can also be asking for the transfer of cash.

Part 3
Types of email scams
Lesson 1 Virus-generated
email
Email scams

Example of a
virus-generated
email

Part 3
Types of email scams
Lesson 1
Email scams
How to protect ourselves
from email scams
Use a SPAM filter to
prevent any
common email
scams reaching your
mail box.
Always be alert and
suspicious! Never
click on any emails, Part 4
Protect from email scams

links or attachments.
HACKING
Lesson 2
Logic bombs
Lesson 2
Hacking

What is it?
A string of malicious code inserted intentionally in a
program that tells the computer to harm a network
when conditions, like specific time and date, is met.
Who uses logic bombs?
Logic bombs can be use by blackmailers or unhappy
employees that want to seek revenge.

Part 1
Logic bombs
Computer misuse act
Lesson 2
Hacking

Can be abbreviated as CMA


This is an act drafted in 1990 to provide a
law to govern how individuals can legally,
lawfully access data on a computer
system.
Based on the CMA, it is illegal to acquire
access a computer without permission,
and make changes to files on a computer
without permission.
Part 2
Computer misuse act
Lesson 2
Hacking
Examples of computer
misuse
Cyber-bullying
Hacking
This is what
we will
focus on
this lesson
Identity theft
Using a work
PC for personal
Part 2
Computer misuse act

businesses
Hacking
Lesson 2
Hacking

What is hacking?
Hacking is the act of identifying, exploiting weaknesses in a computer
system or network. This is then further aimed at gaining access to and
being able to modify personal or organizational data unauthorizedly.
Why do hackers hack?
For financial gain
Basic bragging rights
Revenge
Part 3
Challenge Hacking

For political reasons


Lesson 2
Hacking
How do hackers hack?
Through using security holes exposed in
websites to access information
Take advantage of obvious and common
usernames and passwords
Trick people into downloading malware onto
their computer, which therefore gives the
hacker access to view and modify the user’s
files.
Part 3
We will focus mainly on understand how Hacking

hackers hack using malware.


Lesson 2
Hacking
What is malware?
Malware stands for malicious software.
Malware is a small program which enters a computer
or network through a downloaded file or vulnerability
in a network.
Effects of malware:
Gather personal or sensitive data from the user’s
computer
Modify or delete files on the user’s computer
Cause a device to become locked or unusable
Part 4
Take control of one user’s device to attack other Malware

organizations
Lesson 2
Hacking What is computer virus?
A virus is a type of malware
A computer virus can replicate by copying itself to another program, computer
boot sector or document without the user’s consent.
A computer virus can change the way in which a computer works.
A computer virus can be spread to another computer through emails or file
sharing.

Part 4
Malware
Lesson 2
Hacking
Types of common
malware
Browser hijacking
This is a malware that changes a browser’s behaviour, settings, or appearance
without the user’s consent. Also, this malware can redirect the user to websites
they haven’t intended to be in.
File infector virus
This is a computer virus that infects a particular file. It may completely or
partially overwrite the file. This virus can later spread itself to other executable
files and programs.
Macro virus
This virus is written in the same macro language as used in
the software program. This virus is embedded in the Part 4
Malware
template files, like Word or Excel, and will infect the
computer when this file is opened.
Signs of malware
Lesson 2
Hacking

A new toolbar appears on the user’s browser


The homepage is changed unexpectedly
The user’s computer suddenly runs a lot slower
Even when offline, a lot of pop-up adverts still appear
The user’s hard disk is doing overtime but the user’s isn’t doing anything

Part 4
Malware
Lesson 2
Hacking How to avoid malware
Avoid clicking on everything, especially
ones that are too good to be true, both on
websites and emails
Don’t visit illegal sites, especially ones that
allow users to download copyright
materials
Install up-to-date antivirus and
antispyware software
Update the browser software regularly
Part 5
Make sure the browser is set to ask for Protecing

permission before downloading materials


Lesson 2
Hacking Protecting with passwords
Hackers can also guess common and easy
passwords to login and steal users’
information from different sites.
Therefore, we should use password that are
strong, containing numbers, capital,
lowercase letters, and symbols.
Also, change your passwords frequently,
one time after 2,3, months.
You can check the strength of you
Part 5
password through this website: Protecing

www.passwordmonster.com
PROTECTING
PERSONAL
DATA
Lesson 3
Lesson 3
Protecting personl data
Holding data
Who holds personal data about you?
School/Workplace
Doctor/Hospitals
Online organizations/websites/apps
What information can online organizations/website/apps, like Google, hold
about you?
Name
Birthday
All contact names and addresses
Types of mobile phones you're using Part 1
Holding data

All the websites, images, videos you've looked at


Lesson 3
Protecting personl data
Rules of holding data
There are rules and regulations about collecting and holding personal data.
If a company, school, club or other organization wants to hold personal data of
someone, they must register with the Data Protection Registrar.
Data Protection Act
Abbreviated as DPA
This Act specifies the rules about collecting and holding data.
These rules include:
The data must be accurate and up-to-date
The user or owner of the data has the right to see what data is held about
them Part 1
Holding data
The data must be protected from unauthorized access.
Lesson 3
Protecting personl data
Indentity theft
What is it?
Identity theft is when someone steals the personal information of someone
else and then uses it for their personal or financial gain, through actions like
applying for a job, a bank account or a loan under the identity of the person
whose information was being stolen..
Data harvesting
Data harvesting is the process of extracting
data from a given source.
Personal information of many individuals, like
name, social media profile, email addresses, can be
gathered using legal and free available data harvesting
Part 2
Identity theft

tools.
Lesson 3
Protecting personl data
Ways to protect
personal identity
Destroy private records and statements,
like credit card statements
Secure the email
Don’t post photos taken at home
Turn off location sharing
Don't include personal data, like birth
date, adsress, phone number, in the
profile.
Be aware and change the privacy settings
Avoid using public wifi Part 3
Protecting
Invest in security softwares
COPYRIGHT
AND
PLAGIARISM
Lesson 4
Lesson 4
Copyright & Plagiarism
Copyright law
What is it?
Copyright law protects the
owner of a creative work from
having it illegally copied.
This is a copyright sign ©
This sign on a creative work
means that you are not allowed
to copy or redistribute it.
These creative work include fine
artwork, dance, writing, film- Part 1
Copyright law
making, and composition.
Lesson 4
Copyright & Plagiarism
Copyright and
personal use
It is completely okay to transfer a copy of a CD
you have bought onto your own computer hard
drive or portable music player.
As long as this is only for personal use, it is
totally fine.
However, it is never okay to sell or make a profit
of an unauthorized copy of copyright material.
If you do so, Internet service providers with your
computer’s IP address will send out advisory
letters. Part 2
Personal use
Lesson 4
Copyright & Plagiarism
Examples of copyright
infringements
When you make an mp3 copy of a song from a CD you bought that gives you
permission to do this, and share the mp3 copy on the Internet using a file-
sharing network, which millions of other millions of other people can
download it.
Even simpler, when you receive an email with a copy of a copyrighted song,
and you forward this email to all of your friends.

Part 3
Examples of copyright
Plagiarism
Lesson 4
Copyright & Plagiarism

What is it?
Plagiarism means copying someone
else’s work and presenting it as your
own. This could be ideas, words,
images, music, etc.
Plagiarism has a lot in common with
copyright infringement but it is not the
same thing.
In general terms, plagiarism is an ethical
issue and copyright infringement is a Part 4
Plagiarism

legal one.
Lesson 4
Copyright & Plagiarism
Detecting
plagiarism
Universities, publishers and other institutions use software to detect
plagiarism.
These software compares, for example, a student essay with millions of
online documents to check for a mark of similarity to any of the other work.

Part 5
Detect plagiarism
Lesson 4
Copyright & Plagiarism
Examples of
plagiarism
When you use a couple of
paragraphs of writing, without the
acknowledgement of the author,
from a book that is out of copyright,
in a short story submitted in a
competition you joined.
When you buy an essay or a project
from a website with permission to
use it, and submit it as your Part 6

coursework to the teacher.


Examples of plagiarism
HEALTH
AND
SAFETY
Lesson 5
Health and computers
Lesson 5
Health & Safety

Using computers for a long time will cause the following problems
to your health:
Back, neck, shoulder pain
Headache
Eyestrain
Repetitive Strain Injury (RSI) from repeating the same actions over and over
again
To avoid computer-related injuries:
We need to use proper furniture, work with better posture, and have good
working habits.
We should take regular breaks from using a computer Part 1
Health&computers
and should do some physical activities each day.
Lesson 5
Health & Safety
Health and safety
regulations
The law states that an employer must:
provide tiltable screens
provide anti-glare screen filter
provide adjustable chairs
provide foot supports
make sure lighting is suitable
make sure workstations are not cramped
plan work at a computer so that there
are frequent breaks
pay for appropriate eye and eyesight Part 2
Regulations
tests by an optician
Lesson 5
Health & Safety
A well-designed
environment
Proper lighting: Not too bright or
too dim
Reduce glare on the screen:
Make sure the lights aren’t
reflecting directly off your
screen
Take regular breaks: Stand,
stretch, or just look into the far
distance every
Part 4
15-20 minutes. Environment
Health and safety law
Lesson 5
Health & Safety

Under health and safety law,an employer has


a responsibility:
Ensure the health and safety of their
workers
Ensure the safety of premises used for
work
Avoid risks to the health and safety of
non-employees
Employers ignoring these regulations may
have to pay a fine, or in the worst cases, face Part 5
Law
a prison sentence.
Lesson 5
Health & Safety
What happens to old
computers?
The glass screen is removed and recycled during the break-down process.
The keyboard and exterior, either metal or plastic is sorted, shredded and
recycled.
Lastly, all the interior components, such as, circuit boards and computer chips
are destroyed, sorted by type, shredded and recycled.

Part 6
Old computers
Lesson 5
Health & Safety
Environmental effects
of old computers
Environmental effects of old computers:
Hazardous waste
Hazardous materials in electronic devices can
leach into the earth and get into water
supplies.
Lighting these materials on fire will causes
pollution in the atmosphere
And because of this complexity, there are
laws governing safe disposal electronics, such
as The Waste Electric and Electronic Part 6
Old computers
Equipment (WEEE) Regulations 2013
Recycling option
Lesson 5
Health & Safety

You can also recycle, reuse your old computers instead of


throwing it away.
Return to the Manufacturer: Some companies offer a part
exchange scheme to exchange old products for part
payment towards newer products.
Professional Waste Disposal: Professional companies will
collect and dispose of your items properly.
Donate to charity: A number of non-profit organisations
collect items either for re-use or for recycling
Part 6
Give to family or friends: Help the environment too. Old computers
Lesson 5
Health & Safety
Dealing with old
devices (1)
Electronic waste, or E-waste is becoming a rapidly
growing problem.
The world’s insatiable appetite for technology is
continuing to grow at an alarming rate as people use an
increasing number of electronic gadgets such as mobile
phones, MP3 players and even washing machines.
The disposal of these items when their use has expired
needs to be considered more seriously.
Discarding electronic products into general waste, means
Part 7
it ends up as landfill. Old devices
Lesson 5
Health & Safety
Dealing with old
devices (2)
Toxic materials, such as lead, mercury and cadmium, used
in the production of batteries and circuit boards can leak
into the surrounding environment and pollute groundwater.
Some of the materials used are very valuable and it is
estimated that there is about £35 billion worth of gold,
copper and palladium buried in ‘urban mines’ where e-
waste has been dumped.
Regarding old hard disks, people can use a data recovery
program, they can recover files from the suer’s hard disk,
even if the user has deleted them or reformatted their hard Part 7
Old devices

drive.
ICT

THANK YOU FOR


WATCHING MY VIDEO
!!!
By: TRAN Le Ngoc Khanh (Cally)

You might also like