Computer Crimes, Security & Law
Computer Crimes, Security & Law
Computer Crimes, Security & Law
& LAW
COMPUTER CRIMES,
SECURITY & LAW
• Computer Crime
• Data security
• Security threats
• Computer virus
• Worms
• Personal computer security
• Backup of data
• Antivirus
• Data Protection Legislation
• Data Protection in Pakistan
• Intellectual Property
COMPUTER CRIME
• A type of crime in which a computer is either the target or the tool for
an illegal activity is called computer crime.
• A type of crime that refers to an illegal act involving the internet is
called cyber crime.
• It usually involves stealing, using or selling someone else’s data.
COMPUTER CRIME: COMPUTER
CRIMINALS
• Computer criminals are the persons who commit computer crimes.
• Different type of computer criminals are
• Hacker
• Script Kiddie
• Corporate Spy
• Unethical Employee
• Cyber Extortionist
• Cyber Terrorist
METHODS USED BY COMPUTER
CRIMINALS
• Bomb: It is a program that triggers under certain conditions. It is
usually activated at a certain date.
• Denial of Service: It slows down a computer system or network. It
floods a computer or network with requests for information or data. The
server under attack receives so many requests that it can not respond to
legitimate user. Most common targets re internet service providers
(ISPs).
METHODS USED BY COMPUTER
CRIMINALS
• Piggybacking: It is a process of entering the system by riding on the
back of an authorized user. It occurs when an authorized user does not
log off the system properly. An illegal user may continue where original
user left.
• Salami Technique: It is a process of getting a small amount of money
illegally from a large financial system.
METHODS USED BY COMPUTER
CRIMINALS
• Scavenging: It is a process of searching company’s trash can s to find
useful information. The thieves search garbage and recycling bins of
individuals to find bank account numbers and credit card numbers etc.
• Trap Door: It is an illegitimate program that is left within a completely
legitimate program. It allows subsequent entry by unauthorized user in
the system.
• Zapping: The zapping software is designed to bypass all security
systems.
SECURITY
• Hacker:
• A person who accesses a computer, network and its resources illegally is
known as hacker.
• Hackers are computer experts and user their computer knowledge for
negative purpose.
• Hackers may steal
• Information of clients or customers.
• Credit card details
• Passwords to access computers illegally
• Email passwords to use email account without user’s knowledge
SECURITY THREATS
• Software Theft:
• Software theft means that a person can steal software media, erase
software program or copy it without permission
• Information Theft:
• Information theft is a process of stealing personal or confidential
information.
• The stolen information can further be used for illegal activities e.g.
stealing credit card details and use it for online shopping.
SECURITY THREATS
• System failure:
• System failure is an important security threat and it occurs when the
system does not function properly for longer time.
• System failure may further cause loss of data, software and hardware.
• It occurs due to various reasons
• Obsolete hardware
• Natural disaster such as flood, fire or storm
• Fluctuation in power supply
COMPUTER VIRUS
• Computer viruses can not damage hardware but they can cause many
damages to computer system.
• A computer virus can
• Damage data or software
• Delete some or all of the files
• Destroy all data by formatting hard disk
• Display a false message every few times.
COMPUTER VIRUS: CAUSES
• Backup:
• An additional copy of data or information stored on secondary storage
media is called backup.
• It is very important to take backup of data regularly and store it at a safe
and protected place.
BACKUP OF DATA
• Incremental backup creates a copy of only the data that is newly created
or modified since the last backup.
• This process is performed automatically in some software.
• In this type, entire disk is not copied so it takes less time and space.
ANTIVIRUS
• Patents: inventions like a new form of airplane engine, a floor cleaner, etc.
• Designs: it includes the shape of a bottle, machine, model of luxury car or
any other product, etc.