Starter

  1. List two ways in which you can keep safe when using a computer at home.

Computer Crime

Learning Intentions

  • Understand what computer/cybercrime is

  • Identify and compare different threats to technology

  • Identify, describe and compare different security software 

     

Success Criteria

  • I am able to compare different threats to technology
  • I am able to compare different forms of security software and gain knowledge of their functions in protecting contemporary technologies

Crime

  • An action or omission which constitutes an offence and is punishable by law. [n]
    Oxford Dictionary

     

Crime

  • A man walks into a bank.

  • He provides details of someone else’s account and requests to withdraw all the money in the account
    In what way is this man committing a crime?

He is committing fraud

He is committing fraud

Who is who in cybercrime?

Edward snowden

  • These days, computer crime is as serious as crime that took place before computers existed.

  • For example, Edward Snowden (pictured) copied and distributed information from the NSA (National Security Agency) in 2013.

     

Associated Press

  • In 2013, Associated Press’ Twitter account was hacked, and the hacker posted a fictious tweet stating that the White House had been attacked and President Obama had been seriously injured.

Associated Press

  • As a result of it,  people lost confidence in Associated Press and it lost $130 billion in share value within a few hours, whilst AP’s Twitter account was suspended.

List three types of computer crime other than hacking and sharing unauthorised information that could occur

Task

Computer Misuse Act (1990)

  • The Computer Misuse Act (1990) is one of the most important acts in place with regards to security and the use of computer systems.

  • The Computer Misuse Act makes the following illegal:

    1. Unauthorised access to a computer. This means entering/logging in to a computer without permission (also known as hacking)

    2. Unauthorised access to a computer with the intent of committing a further crime such as planting a virus.

Computer Misuse Act (1990)

  1. Unauthorised modification of data. This means changing or deleting data on a computer system without the permission of the owner. It also covers the use of malware and spyware.

  2. Making, supplying or obtaining anything which can can be used in computer misuse offences (such as viruses, malware, spyware)

     

Data protection Act (1998 & 2008)

  • The Data Protection Act (2018) and the General Data Protection Regulation (2018) were put in to ensure that data collected and stored by individuals and companies is:

    1. Processed lawfully

    2. Used only for the declared purpose

    3. Not held for longer than is necessary

    4. Only limited to what is needed

    5. Accurate

    6. Held securely

Computer crime is serious

Hacking is very serious...

  • Hacking is about gaining unauthorised access to a computer system.

  • Hacking is a very common computer crime these days.

Find the names of four famous hackers.

Task

Password security

Password security

  • Strong passwords are an easy yet important way to stay safe. A weak password is easy to guess.

  • There are 17,576 three letter words.

  • There are 11,881,376 five letter words.

  • There are 60,466,176 five letter words which can contain the symbols !, @, #, $, %, ^, &, *, (, ) from the keyboard

  • There are 78,364,164,096 seven letter words which can contain the symbols !, @, #, $, %, ^, &, *, (, ) from the keyboard 😳

     

Password security

How secure is the following password?

bird

How secure is the following password?

edinburgh

How secure is the following password?

Password101!

How secure is the following password?

(d3nvwCgfWA4pV,G

How secure is the following password?

8925

How secure is the following password?

34a2kl3!

How secure is the following password?

34A2kl3!

How do we make a password strong?

  • Use a combination of letters and numbers

  • Use symbols

  • Use a combination of lower and uppercase characters

  • Use random combinations of letters, do not use names or words from the dictionary

  • Don’t use the same password in multiple locations!

     

Create a strong password and test it at http://bit.ly/33SlTqm 

To make a strong password worthwhile, you must be able to memorise it!

Do not write down any passwords you use!

Task

JB
Cybersecurity : 1.1 Computer crime
© J Balfour
Tools