1 - Ict and Crime
1 - Ict and Crime
Computer crimes are criminal activities, which involve the use of information Computer crime, or Cybercrime, refers to any crime that involves a computer and
technology to gain an illegal or an unauthorized access to a computer system with a network.
intent of damaging, deleting or altering computer data.
The computer may have been used in the commission of a crime, or it may be the
Computer crimes also include the activities such as electronic frauds, misuse of target.
devices, identity theft and data as well as system interference.
Cybercrime
Computer crimes may not necessarily involve damage to physical property. They encompasses any criminal act dealing with computers and networks (called hacking).
rather include the manipulation of confidential data and critical information. Additionally, cybercrime also includes traditional crimes conducted through
the Internet. For example; hate crimes, telemarketing and Internet fraud, identity
Computer crimes involve activities of software theft, wherein the privacy of the users theft, and credit card account thefts are considered to be cyber crimes when the
is hampered. These criminal activities involve the breach of human and information illegal activities are committed through the use of a computer and the Internet.
privacy, as also the theft and illegal alteration of system critical information.
Netcrime is criminal exploitation of the Internet
The different types of computer crimes have necessitated the introduction and use of cyber-
newer and more effective security measures. A prefix that means "computer" or "computer network,"
1
1/18/2023
Cyber terrorism can be defined as an act of terrorism committed through the use of
cyberspace or computer resources such, a simple propaganda in the Internet, that
there will be bomb attacks during the holidays can be considered cyber terrorism. Cyberwarfare is any virtual conflict initiated as a politically motivated attack
on an enemy's computer and information systems. Waged via the Internet, these
Cyberextortion is a form of cyberterrorism in which a website, e-mail server, or attacks disable financial and organizational systems by stealing or altering
computer system is subjected to repeated denial of service or other attacks by classified data to undermine networks, websites and services.
malicious hackers, who demand money in return for promising to stop the attacks.
Cyberwarfare is also known as cyber warfare or cyber war
Cyber warfare is a term used to describe the use of the Internet to wage war in the
virtual world, often with real effects in the physical world. Although generally cyber
warfare refers to attacks from one sovereign state on another in cyberspace, it may Cyberwarfare refers to politically motivated hacking to conduct sabotage and
also be used to describe attacks between corporations, from terrorist organizations, espionage.
or simply attacks by individuals called hackers, who are perceived as being warlike in
their intent. In recent years, cyber warfare has become an issue of much concern
among the major nations on the planet, and virtually every national military now has a
branch dedicated to both conducting and defending against cyber warfare.
disruption of normal operations and equipment, such as communications, Cyber law is the area of law that deals with the Internet's relationship to technological
and electronic elements, including computers, software, hardware and information
fuel, power and transportation infrastructures. systems (IS).
Espionage and/or security breaches: These illegal exploitation methods are
Cyberspace The notional environment in which communication over computer
used to disable networks, software, computers or the Internet to steal or networks occurs: I stayed in cyberspace for just a few minutes
Cyberattack an attempt by hackers to damage or destroy a computer network or
acquire classified information from rival institutions or individuals for system.
military, political or financial gain.
Organized crime and often criminal organizations are terms which
categorise transnational, national, or local groupings of highly centralized enterprises
run by criminals, who intend to engage in illegal activity, most commonly
for monetary profit.
2
1/18/2023
3
1/18/2023
4
1/18/2023
Software Piracy
A term used to describe the act of illegally using, copying or distributing Junk mail
software without purchasing the software or having the legal rights. The Unsolicited mail sent out usually by direct marketing ordirect mail firms. Used
majority of software purchased today is purchased as a one-site license, mainly for introducing new products, books and magazines, investment
meaning that only one computer may have that software installed on it at opportunities, merchandise catalogs, etc., junk mail is big business in
one time. Copying that software to multiple computers or sharing it with industrialized countries especially the US, UK, and Canada. Unsolicited
your friend without multiple licenses is considered illegal and is email is called spam.
5
1/18/2023
6
1/18/2023
Employees are your first line of defense against cybercriminals — but they’re Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child
also your biggest security hole. Negligent employees are the most common exploitation) or if you suspect a computer crime, identity theft or a commercial
cause of data breaches. scam, report this to your local police. If you need help with maintenance or
software installation on your computer, consult with your service provider or a
certified computer technician.
7
1/18/2023
Between January of 2012, and April of 2013, AlexseyBelan is alleged to have intruded the
WANTED CYBER CRIMINALS BY US computer networks of three major United States-based e-commerce companies in Nevada and
California. He is alleged to have stolen their user databases which he then exported and made
readily accessible on his server. Belan allegedly stole the user data and the encrypted passwords
ALEXSEY BELAN of millions of accounts and then negotiated the sales of the databases.
Computer Intrusion; Aggravated Identity Theft; Two separate federal arrest warrants for Belan have been issued. One was issued on September
Fraud in Connection With a Computer 12, 2012, in the United States District Court, District of Nevada, Las Vegas, Nevada, after Belan
REWARD: The FBI is offering a reward of up to was charged with obtaining information by computer from a protected computer; possession of
$100,000 for information leading to the arrest of fifteen or more unauthorized access devices; and aggravated identity theft. The second warrant
AlexseyBelan. was issued on June 6, 2013, in the United States District Court, Northern District of California,
San Francisco, California, after Belan was charged with two counts of fraud in connection with a
computer and two counts of aggravated identity theft.
Belan has Russian citizenship and is known to hold a Russian passport. He speaks Russian and
may travel to Russia, Greece, Latvia, the Maldives, and Thailand. He may wear eyeglasses and
dye his brown hair red or blond. He was last known to be in Athens, Greece.
PeterisSahurovs is wanted for his alleged involvement in an international cybercrime scheme that took place from
February of 2010 to September of 2010. The scheme utilized a computer virus that involved the online sale of
fraudulent computer security programs that defrauded Internet users of more than $2 million.
It is alleged that in February of 2010, Sahurovs contacted an online newspaper claiming to work for an online
advertising agency that represented a hotel chain that was seeking to place advertisements on the paper's
PETERIS SAHUROVS website. Sahurovs utilized fraudulent references and bank accounts to deceive the newspaper into believing he
Wire Fraud; Conspiracy to Commit Wire Fraud; represented a legitimate advertising agency.
Sahurovs provided electronic files containing the fictitious hotel advertisements to the newspaper, which began
Unauthorized Access to a Protected Computer running the advertisements on its website. He then replaced the hotel advertisements with a file containing a
malicious computer code, or malware, which infected the computers of people who visited the website and
REWARD: The FBI is offering a reward of up to required them to purchase antivirus software for $49.95 to regain control of their computers. If the users
$50,000 for information leading to the arrest of Peteris did not purchase the software, their computers immediately became inundated with pop-ups containing fraudulent
Sahurovs. "security alerts," and all information, data and files stored on the computers became inaccessible.
Sahurovs allegedly conducted the same fraudulent advertising and infection scheme against numerous online
businesses.
On May 17, 2011, Sahurovs was indicted by a Federal Grand Jury in the United States District Court, District of
Minnesota, for wire fraud, conspiracy to commit wire fraud, and unauthorized access to a protected computer. The
same day, a federal warrant was issued for Sahurovs' arrest.
Sahurovs is thought to be in Rezekne, Latvia. He may also visit Kiev, Ukraine. He is known to use the following
screen names: "PIOTREK," PIOTREK89" and "SAGADE."
8
1/18/2023
Artem Semenov is wanted for his alleged participation in an Eastern European cyber
ARTEM SEMENOV crime ring, operating out of New York, which is known for recruiting money mules to
Conspiracy to Commit Bank Fraud; open bank accounts, cashing out money received through unauthorized money
Conspiracy to Possess False Identification transfers, and then transferring the money overseas. An arrest warrant was issued for
Documents; False Use of Passport Semenov in the Southern District of New York on September 29, 2010, after he was
REWARD: The FBI is offering a reward charged with conspiracy to commit bank fraud; conspiracy to possess false
of up to $50,000 for information leading to identification documents; and false use of passport.
the arrest of Artem Semenov. Semenov speaks both Russian and English, although his English may not be that good.
He tends to stay close to Russian communities. He may enjoy frequenting casinos and
playing poker. He may travel to Las Vegas, Nevada.
Exercise:
1. You should be able to explain criminal activities facilitated by ICT
2. Are you aware on ICT crimes? Give out examples of ICT crimes occurred
3. Can you explain the intervention measures against ICT crimes
4. Try to find the meaning of the following words
Cyberspace Service
Cyberspace Company
Cyberspace Technologies
Cyberspace Game
Cyberspace Jobs
cybershop
cyberslacker
cybersphere
cyberspying
9
1/18/2023
Review questions
1. Explain at least five areas where computers are used
2. Discuss how a computer is used in:
a. Reservation systems
b. Banking THE UNITED REPUBLIC OF TANZANIA
10
1/18/2023
Information Security
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized
access, use. Or Simply the process of keeping information secure
Information security: Is the collection of technologies, standards, policies and
management practices that are applied to information to keep it secure.
42
COMPONENTS OF INFORMATION SYSTEM 2. Software: The term software refers to computer programs and the manuals
11
1/18/2023
5. People: Every system needs people if it is to be useful. Often the most over-
3. Data: Data are facts that are used by programs to produce useful
looked element of the system are the people, probably the component that
information. Like programs, data are generally stored in machine-readable most influence the success or failure of information systems.
form on disk or tape until the computer needs them.
WAYS OF PROTECTING INFORMATION SYSTEMS Never trust disks from other people. Anytime you receive a file on any type
of media check it first for viruses!
Save your work Perform regular maintenance. Learn how to use the utilities that diagnose
Make a backup. your system for problems. It is a good idea to run a disk-scanning program,
Keep a copy of your data offsite. Diligently backing up your data is good defragment your hard drive, or whatever else your system might need.
practice but keep a copy of your data offsite. If there were a fire or other These utilities can prevent little problems from becoming big problems, and
disaster your onsite data backup could be lost as well will keep your system running at top speed.
Never open email attachments by habit. If your email reader Apply Physical security,
has an option to automatically open attachments you should Set Firewalls
disable that feature. Always run any attachments and Apply Encryption,
downloaded files through a virus scanner first. Use Biometric security,
12
1/18/2023
Use Anti-virus and anti-spyware software and Update your software. Physical threats
Make sure you have the latest updates for your software - especially for Besides people, there are plenty of other ways that data can be lost or
your virus checking software. Make it a habit to regularly check for updates damaged.
and enable automatic updates for software that offers that feature. Here are a few more to think about.
• Educate users,
• Use User IDs & passwords and methods for ensuring 1. Fire,
passwords remain effective 2. floods
3. lightning damage
Although thankfully a rare occurrence, fires and floods do happen.
13
1/18/2023
PASSWORD
a password is a set of secret characters or words utilized to gain access to a
There are many things you can do to make your equipment more secure:
computer, web page, network resource, or data. Passwords help ensure that
- Lock the room when not in use computers or data can only be accessed by those who have been granted the
- Use swipe cards or keypads to activate locks right to view or access them.
14
1/18/2023
Weak password - A password that is not an effective password because it's 8. Same password or similar passwords should not be used in other applications.
easy to remember. Examples of a weak password are names, birth dates, 9. Do not use series like abc or 123 or 321.
phone numbers, easy guessable word, etc. Below is an example of a weak HOW TO CREATE USER ACCOUNT
password. Click start
Click Control panel
A good password should be. Or characteristics of a good password Click or Open User Accounts.
1. It should not be found in a dictionary. Click your account name.
2. It should contain special characters and numbers. Click Create a password.
3. It should contain a mix of upper and lower case letters. In Type a new password and Type the new password again to confirm,
4. There should be at least 8 characters. type the password for your account.
5. It should not be able to be guessed based on user information. You can also enter descriptive or meaningful text in Type a word or
phrase to use as a password hint to help you remember your
6. It should not be shared with anyone. password.
7. It should not be written down anywhere. Click Create Password.
15
1/18/2023
BIOMETRIC
Types of biometric devices Finger scanner - Like the picture shown on this page a biometric finger
Face scanner - Biometric face scanners identify a person by taking scanner identifies the person by their finger print. These can be a secure
measurements of a person face. For example, the distance between the method of identifying a person, however, cheap and less sophisticated
persons chin, eyes, nose, and mouth. These types of scanners can be very finger print scanners can be duped a number of ways. For example, in the
secure assuming they are smart enough to distinguish between a picture of show Myth Busters they were able to fake a finger print using a Gummy
a person and a real person. Bear candy treat.
Retina or iris scanner - A biometric retina or iris scanner identifies a person
Hand scanner - Like your finger print, the palm of your hand is by scanning the iris or retina of their eyes. These scanners are more secure
also unique to you. A biometric hand scanner will identify the biometric authentication schemes when compared to the other devices
person by the palm of their hand. because there is no known way to duplicate the retina or iris.
16
1/18/2023
Voice scanner - Finally, a voice analysis scanner will mathematically break IMPORTANCE OF PROTECTING INFORMATION SYSTEMS
OR Needs for information systems security :
down a person's voice to identify them. These scanners can help improve Data independence and efficient is maintained- this independence ensures
security but with some less sophisticated scanners can be bypassed using a that the data cannot be redefined or reorganized by any of the programs
that make use of it. In this manner, the data remains accessible, but it is
tape recording. also stable and cannot be corrupted by the applications.
Data sharing is secured
Data assurance and reliable is maintained- ensuring that data is not lost
IMPORTANCE OF PHYSICAL SECURITY, PASSWORD AND BIOMETRIC when critical issues rise.
Data redundancy is overcome
• To help prevent theft and fraud,
Data security is maintained
• To help prevent loss, Integrity and consistency is maintained- keeping information uniform as it moves
across a network and between various applications on a computer. Ensuring that
• To help prevent unauthorized access information and programs are changed, altered, or modified only in a specified and
authorized manner - e.g., preventing an adversary from modifying orders given to combat
• They ensure security and confidentiality units so as to shape battlefield events to his advantage.
17
1/18/2023
18
1/18/2023
Retraining
Many people who found that their job had disappeared because of the Review questions
introduction of computers have had to re-train.
They might have been kept on to do the same role but using a computer
rather than doing things by hand. 1. Explain at least three effects of introduction of ICT in
Or if their job disappeared completely, they would probably have had to train workplaces
and learn a whole new set of skills. 2. List three advantages and disadvantages of automated
Training can be given by people within the company or often by an external
production
company.
Training is a large industry in itself because of the demand to keep up with the 3. State advantages of using electronic point-of-sale terminals as
latest developments. opposed to manual entry at a supermarket checkout counter?
Whatever method is used , training is expensive. While the person is learning
to use the new technology, they are not working to full capacity.
Mr. Yusuf D 74
ICT AND CULTURAL INTERACTION For example, it is common to see the western electronic media showing nude
Most notable is the influence of ICT on cultural change. The rapid growth of pictures of people or display of otherwise considered private parts that are not
ICT has not only affected the way we work, but also how we play, think and to be displayed in public. Furthermore, through internet, it is now common to
also a challenge to upholding of ancestral morals and cultural values. ICT has see pornographic materials that affect moral values negatively. The free
also affected the way we talk, our privacy, human rights and our integrity. flowing immoral information has negatively influenced the behaviour of both
Since ICT was brought to us by people with a different culture and moral the young and the old in society. Internet users are also exposed to a form of
perceptions, the electronic media has manifested itself into the new cultural communication called flaming, done through on-line messages that use
remix. derogatory, obscene or dirty language
19
1/18/2023
ICT has provided a platform for western cloth designers and models who ICT HAZARDS
promote western designer wear, cosmetics at the peril of traditional wear and
Health hazards of ICT to human being
outfits that has been discarded as outdated and out of fashion. Western Hip
Hop, and to some extent, a remix Bongo flavour music has at times being void There are various health problems associated with the regular use of
of the local melody, gestures, postures that are from other cultures. computers, such as stress, eyestrain and injuries to the wrists, neck and back.
However, ICT has its advantages in that it has been widely used as an awareness
Employers must take steps to protect employees whose work involves the
campaign platform against bad aspects of the society such as drug abuse, prostitution,
corruption, and other negative social behaviours. ICT has in the other hand provided a regular use of computers
forum for promoting traditional cultural practices and performance to distant people
than it was possible in the traditional society.
20
1/18/2023
Backache & Neck Pain Repetitive Strain Injury (RSI) is damage to the fingers, wrists and other parts
of the body due to repeated movements over a long period of time.
Many computer users suffer serious back and neck problems. This is probably
due to a poor posture or an awkward position while sitting at a computer. Symptoms:
Some of the things that people can do to help avoid back pain are: In the arms and hands:
- Use a fully adjustable chair. The height of the chair and the seat position Aching
should be easy to change. pain in arms/wrists even after rest
- Use footrests so that the legs are kept at a more natural angle Weakness
- Use a monitor which is adjustable. Position it so that the neck doesn't have to Swelling
bend Tenderness
- Take regular breaks and walk about. Numbness
- Sit with the back straight and the head up, don't slouch pins and needles or burning sensation
In the shoulders and neck:
Stiffness
Aching
Causes
Solution
Typing or using the mouse for long periods of time
Ensure workstation and chair are the correct height
Using too much force on your fingers when typing
Support wrists by using wrist rests
Using a poorly designed keyboard
Keep elbows close to your sides
Workstation or chair is the wrong height so arms are in an unnatural
Five minute break from typing at least every hour
position
21
1/18/2023
Stress
Stress brought on through the use of computers is one of the major causes of work - The amount of information that ICT systems can produce is often far too
related illness.
There are many different reasons why people become stressed at work. However,
much for anyone to take in. This results in 'information overload' and people
here is a list of some of the major causes brought about by the use of computers: end up feeling they can't cope and become stressed.
- Many people are afraid of computers, they don't understand them and feel they will
look stupid if they admit that they don't know how to operate one. - Workers can be monitored using ICT systems. Call centre staff are monitored
- People worry that a computer will be able to replace them and they might lose their
to make sure that they don't spend too long on any one call. The number of
jobs.
- Things change so fast in the world of computing that it can be very stressful just products that a check-out person scans during a minute are counted. This
trying to keep up to date with new ideas, techniques and equipment, especially for
older people. feeling of being constantly 'watched' can be very stressful.
- It is getting increasingly hard to separate work and home life. People can be
contacted easily by their bosses or clients. E-mail, the Internet and mobile phones
mean that people continue to work even after they have left the office.
22
1/18/2023
Lead
Cadmium
Lead accumulates in the environment and has high acute and chronic toxic effects
on plants, animals and microorganisms. Cadmium compounds are classified as toxic with a possible risk of
Lead is known to cause damage to the central and peripheral nervous systems, irreversible effects on human health.
blood system and kidneys in humans. Cadmium and cadmium compounds accumulate in the human body, in
Effects on the endocrine system have been observed, and serious negative effects particular in the kidneys.
on children's brain development are well documented. Cadmium shows a danger of cumulative effects in the environment due to
Lead existing in landfilled products has the potential to leach and contaminate its acute and chronic toxicity.
drinking water supplies. It is found in certain components such as SMD chip resistors, infrared
Lead is found in soldering of printed circuit boards and other electronic detectors and semiconductors.
components. Cadmium is lso found in older models of cathode ray tubes (glass panels in
Lead is also found in glass panels in computer monitors (CRTs).
computer monitors) and in plastics as a stabilizer.
23
1/18/2023
24
1/18/2023
THE END
WISHES YOU ALL THE BEST IN YOUR STUDIES.
Mr. Yusuf D
97
25