16.4 Computer Crimes What are Computer Crimes?

Download Report

Transcript 16.4 Computer Crimes What are Computer Crimes?

16.1 Intellectual Property Rights
 What are Intelligent Property Rights?
 The rights granted to inventors, writers, artists
and other talents for the protection of their
inventions and products
 IPRs consists of intangible property rights,
such as:
Design
Trademark
a sign which
distinguishes
the product or
service form
that provided
by other
traders
Patent
a legal right to
protect your
inventions
after gaining
monopoly of
your products
products can
be registered
to protect their
appearances
Copyright
and designs
the right
from being
gained by the
copied by
owners of the
others
original design
16.1 Intellectual Property Rights
 Copyright Issues
 Copyright is the right given to the owners
of an original work.
 Only the copyright owners can legally
reproduce, sell and distribute the
copyrighted work.
 Protects original literary works as well as
computer works, like computer programs
and materials on the Web.
 We must gain permission of the owners of
rights in the materials before distributing or
downloading them.
16.1 Intellectual Property Rights
 Copyright Issues
 Illegal copies of software are called
pirated software
 Illegal in Hong Kong to install pirated
software in computers for commercial
purpose
The Hong Kong
Customs strives
to eradicate
software piracy
16.1 Intellectual Property Rights
 What has the HKSAR Government
done on the Copyright Issues?
 Hong Kong’s Copyright Ordinance
Prohibits unauthorized copying and use
of computer programs
Protects the copyright of software
programs, materials and related books
as literary works
Gives penalties for unauthorized use and
duplication of software
16.1 Intellectual Property Rights
 Software Licence
 A legal contract defining the ways in which
a user may use a computer program
 Single-user licence
Limits the use of software to only one
machine at a time
 Multi-user licence (site licence)
Permits the use of software by more
users at a specific location
16.1 Intellectual Property Rights
 Software Licence
 Shareware
A freely distributed copyright software
that can be used within the trial period
Generally allows the user to reproduce
and distribute the software
A users need to pay if he wants to use
the software beyond the trial period
WinZip, a popular
shareware
16.1 Intellectual Property Rights
 Software Licence
 Types of software
Method of distribution
Commercial
software
Shareware



Distribute free of charge, mainly downloaded from the
Internet
Commonly accompanied with books or magazines
Users allowed to transfer the software to others

Same as shareware


Freeware
Open
source
software
Through resellers
Downloaded from software, publisher's web site or
authorized online stores


Same as shareware
Distribute with source code
16.1 Intellectual Property Rights
 Software Licence
 Types of software
Cost
Commercial
software
Shareware



Freeware


Open
source
software

More user support → more expensive
Usually developed by smaller developers or independent
writers → relatively cheaper
Payment required after the trial period
Free to use for personal purpose
May not be free to be copied, studied, modified or
redistributed
Free of charge
16.1 Intellectual Property Rights
 Software Licence
 Types of software
Trial period
Commercial
software
Shareware




Freeware
Open
source
software
Some have a trial period (normally ≦2 months)
Some only provide a demo version with limited functions
Usually have a trial period
Some allow the user to use continuously, with the display
of random advertisements on the screen

No trial period

No trial period
16.1 Intellectual Property Rights
 Software Licence
 Types of software
Licence
Commercial
software

Different types of licence are offered
to suit different users’ needs
Examples



Shareware

Similar to commercial software


Freeware


Open
source
software

Copyright software carries a
restricted licence
Free to use under certain conditions
The source code is available a an
open source under an open source
licence for studying, changing and
improving the software




Microsoft Office
Macromedia
Dreamweaver
Adobe Photoshop
WinZip
Flashget
Ad-Aware SE
personal
MySQL
KOffice
Freemind
16.1 Intellectual Property Rights
 Software Licence
 Types of software
Licence
Commercial
software

Different types of licence are offered
to suit different users’ needs
Examples



Shareware

Similar to commercial software


Freeware


Open
source
software

Copyright software carries a
restricted licence
Free to use under certain conditions
The source code is available a an
open source under an open source
licence for studying, changing and
improving the software




Microsoft Office
Macromedia
Dreamweaver
Adobe Photoshop
WinZip
Flashget
Ad-Aware SE
personal
MySQL
KOffice
Freemind
16.2 Data Privacy
 Data Privacy
 Refers to the public expectation of privacy
in the collection, holding, processing and
use of personal data
 Personal Data (Privacy) Ordinance (PD(P)O)
Legislation related to privacy of personal
data
Enforced by the Privacy Commissioner’s
Office (PCO)
16.2 Data Privacy
 Data Privacy
The Privacy Commissioner’s Office homepage
16.2 Data Privacy
 Personal Data
 Common personal data
Types of personal data
Examples
About yourself
A person’s name, sex, age,
photo, religion, marital status
About your contract details
Phone number, e-mail address,
ICQ number, fax number, home
address
About your job
Occupation, salary, employment
records
Other personal data
Financial status, medical
records
16.2 Data Privacy
 Personal Data
 Many companies use their web sites to
collect personal data of their visitors
 Concerned about sharing of personal data
with other companies
 PD(P)O gives rights to individuals to know
The kinds of personal data held
The main purposes of keeping one’s
personal data
16.2 Data Privacy
 Spyware
 A kind of software that performs
unauthorized tasks secretly
 Usually collects personal data for
commercial gains
Stealing personal data, especially
financial information
Monitoring user’s browsing habits for
marketing purposes
16.2 Data Privacy
 Non-personal Data
 Data that is not personally identifiable
 Ranges from user traffic to browser
characteristics
 Examples of non-personal data
Types of non-personal data
User traffic statistics
Examples
Total visitors, page views, firsttime visitors, returning visitors
Browser characteristics statistics Screen resolution, colour depth,
web browser, operating system
 Companies may use the information to
evaluate their web sites, improve design
and enrich the content
16.2 Data Privacy
 Cookies
 A small text file storing information from
the web sites you have visited before
 A web site we have viewed may store
information on our computers in a ‘cookie’
 This allows them to automatically recognize
you when you revisit the site.
16.2 Data Privacy
 Advantages and Disadvantages of
Internet Cookies
Advantages



Store user’s preferences about
the web site.
For simple authentication, e.g.
saving a password that we do
not have to reenter it every
time.
Trace the path of a user while
visiting a web site. This helps
the web site to improve the
navigation functions.
Disadvantages


Inaccurate identification as
the computer may be shared
by multiple users and the user
may browse the same web
site at different locations
The user’s browsing activities
have been logged in the
computer
16.2 Data Privacy
 Advantages and Disadvantages of
Internet Cookies
Advantages



Store user’s preferences about
the web site.
For simple authentication, e.g.
saving a password that we do
not have to reenter it every
time.
Trace the path of a user while
visiting a web site. This helps
the web site to improve the
navigation functions.
Disadvantages


Inaccurate identification as
the computer may be shared
by multiple users and the user
may browse the same web
site at different locations
The user’s browsing activities
have been logged in the
computer
16.3 Unauthorized Access
 What is Unauthorized Access?
 The use of computer data for unapproved
or illegal activities, such as hacking and
cracking
16.3 Unauthorized Access
 The Intentions of Hacking
 Hacking – an illegal access to data in a
computer system
 Common intentions of hacking
Browse information in computer systems
for curiosity or fun
Damage computer data and files
Change content of other’s web site, e.g.
deface a web site
Launch denial of service (DoS) attack on
a web site or network
Steal sensitive information from
computer network
16.3 Unauthorized Access
 Differences between Hacker and
Cracker
 Hacker
May not have commercial interest
 Cracker
Criminal hackers
Use hacking to practice illegal activities
called cracking
16.3 Unauthorized Access
 Measures Against Hacking
 Hacking Offences
Unauthorized access to computer
systems by telecommunication
Access to computer systems with
criminal or dishonest intention
16.3 Unauthorized Access
 Measures Against Hacking
 Protection from Unauthorized Access
Use antivirus software with regular
updates
Use firewall and intrusion detection
systems
Check for spyware on your system
Learn how to choose passwords and
change them regularly
Update operating systems with security
patches provided by software developers
16.3 Unauthorized Access
 Firewall
 Checks the incoming and outgoing data of
the computer
 Prevents outsiders from obtaining
unauthorized access to internal resources
ZoneLab’s
ZoneAlarm is
free for
personal use.
(http://zonel
abs.com)
16.3 Unauthorized Access
 Firewall
 The data allowed into a protected computer
is set by one’s policy
 Too strict a policy will lead to increased
security but access to some useful web
sites may be excluded
Security
When we set
the policy for a
firewall, we
Convenience should balance
security with
convenience
16.3 Unauthorized Access
 Firewall
 A firewall should
Allow users to implement security
policies
Be able to monitor all the suspicious
incoming and outgoing data of the
computer
Be able to alert and provide related
information to the network
administration if there is any intrusion
16.3 Unauthorized Access
 Firewall
 A firewall should
Allow users to implement security
policies
Be able to monitor all the suspicious
incoming and outgoing data of the
computer
Be able to alert and provide related
information to the network
administration if there is any intrusion
16.4 Computer Crimes
 What are Computer Crimes?
 Traditional crimes that are committed
through the Internet, e.g. Internet
gambling and publishing indecent materials
 Illegal activities that are committed using
computers, e.g. hacking and cracking
 Common computer crimes
Type of computer crime
Detail and example
Hacking
Please refer to Section 16.3 for
details.
Criminal damage
It may involve
 physical damage of a computer
system
 disruption or destruction of
computer data files
16.4 Computer Crimes
 What are Computer Crimes?
 Common computer crimes
Type of computer crime
Detail and example
Criminal damage
Damage can be caused by
 web site defacement
 denial of service (DoS) attack
 spread of virus
Internet fraud
Examples are
 Internet shopping / auction fraud
 online lottery fraud
 fake web sites
Misuse of Internet access
accounts
It may involve
 abuse of Internet service
 abuse of online game service
16.4 Computer Crimes
 What are Computer Crimes?
 Common computer crimes
Type of computer crime
Detail and example
Online theft
Common criminal activities are
 abuse of password (Theft of
personal identity number (PIN))
 theft of virtual property used in
online games
 theft of corporate information
 Internet banking theft
Illegal materials/web sites
It usually involves
 Internet pornography
 Unauthorized Internet gambling
16.4 Computer Crimes
 What are Computer Crimes?
 Common computer crimes
Type of computer crime
Offences relating to the use
of instant messaging tools
Detail and example


abuse of instant messaging tools
such as ICQ, MSN
abuse by criminals to make contact
with users especially women and
children and then attempt to
commit crimes, such as unlawful
sexual intercourse and robbery
16.4 Computer Crimes
 What are Computer Crimes?
 Common computer crimes
Type of computer crime
Offences relating to the use
of instant messaging tools
Detail and example


abuse of instant messaging tools
such as ICQ, MSN
abuse by criminals to make contact
with users especially women and
children and then attempt to
commit crimes, such as unlawful
sexual intercourse and robbery
16.5 Indecent and Deceitful
Materials
 Indecent Materials
 Statements, articles or photos that are
vulgar or ungracious to people
 Ways to prevent the immature to access
indecent materials on the Internet
Parental guidance
Filtering software
 Can screen out material inappropriate for
children
16.5 Indecent and Deceitful
Materials
 Deceitful materials
 Untrue remarks or statements made with
the intention of deceiving the others
 Students should learn how to evaluate the
information on the Web
A hoax about ‘AIDS’
Virus spreading through
e-mails
Body of the hoax email
16.5 Indecent and Deceitful
Materials
 Deceitful materials
 Untrue remarks or statements made with
the intention of deceiving the others
 Students should learn how to evaluate the
information on the Web
A hoax about ‘AIDS’
Virus spreading through
e-mails
Body of the hoax email
16.6 Spam
 What is spam?
 Unwanted e-mail or newsgroup postings,
mostly advertising commercial products or
services.
An e-mail inbox full of spams
16.6 Spam
 Problems Created by Spam
 Occupies storage space in e-mail boxes
 Takes users’ time to remove them
 Slows down Internet traffic
 Irrelevant newsgroup postings change the
original purpose of the newsgroups and
even stop normal operations.
16.6 Spam
 Measures to Fight Against Spam
 Never reply to junk e-mail
Spammers usually send junk e-mails to
a big pool of untargeted recipients.
Replying to junk e-mail would imply you
are interested in it.
 Use spam-filtering software
Spam-filtering software permit a range
of user defined actions to block
unwanted emails.
Examples: Spam Weasel, MailWasher,
SpamAgent and MailShield
16.6 Spam
 Measures to Fight Against Spam
An e-mail generated by an anti-spam software,
which lists out the blocked e-mails.
16.6 Spam
 Measures to Fight Against Spam
An e-mail generated by an anti-spam software,
which lists out the blocked e-mails.
16.7 Ways to Protect Ourselves
 Importance of Information
Security
 To companies
Profit severely affected if financial status
and customer data were stolen by its
competitors
 To individuals
Abuse of personal data may cause
Internet banking theft and fraudulent
purchases
16.7 Ways to Protect Ourselves
 Preventive Measures
Scan all incoming e-mails.
Never reply to a junk e-mail.
Backup files regularly.
Delete all kinds of Internet
tracks.
16.7 Ways to Protect Ourselves
 Preventive Measures
Install an antivirus program and
update the virus detection
signature regularly.
Turn off file and printer sharing
on your Internet connection.
Take extra care with your
login name and password.
16.7 Ways to Protect Ourselves
 Preventive Measures
Scan all files downloaded from
the Internet and do not install
any doubtful programs.
Install a personal firewall and
apply updates.
Limit the amount of
information you provide to
the web site.
16.7 Ways to Protect Ourselves
 Preventive Measures
Scan all files downloaded from
the Internet and do not install
any doubtful programs.
Install a personal firewall and
apply updates.
Limit the amount of
information you provide to
the web site.