forensic science informatics p3 m3 d3

Post on 22-Jan-2015

2.576 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Slides for BTEC Applied Science (Forensics) unit 37

TRANSCRIPT

Forensic Science Informatics

Unit 37

Forensic Science Informatics

• P3 describe crimes committed using the Internet

Task 1• List crimes committed using the Internet• Choose five of the crimes and describe them. (How can they

be avoided?)Compile a glossary of computer crime/ sabotage terms The terms should include:

Clipper chip Trojan horse Encryption VirusLogic bomb WormPinging SpywareRemailer AdwareTrapdoor

Computer crimes

Task 2

• Policing the InternetExplain how the Internet is policed (M3)

Task 2

• Policing the InternetExplain how the Internet is policed

Task 2

• Policing the InternetExplain how the Internet is policed

Task 2

• Policing the InternetExplain how the Internet is policed

Explain

• Make plain and comprehensible• Requires details, examples and description• More than a few sentences!

Internet

Internet

World Wide Web

“Policed”

I keep six honest serving-men(They taught me all I knew);Their names are What and Why and When And How and Where and Who.

Rudyard Kipling

Key questions

• What• Why• When• How• Where• Who

is policing the Internet?

do we police the Internet?do we police the Internet?

do we police the Internet?do we police the Internet?

polices the Internet?

Key questions

• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Where do we police the Internet?• Who polices the Internet?

Key questions

• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Key questions

• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Key questions

• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?

Task 3

Evaluate the methods used for policing the Internet (D3)

Task 3

Evaluate the methods used for policing the Internet (D3)

Evaluate

Evaluate the methods used for policing the Internet (D3)

• What are the strengths and weaknesses?• How effective is it?• How it could be improved?• Should we police the Internet?

Personal policing

• Secure browser• Secure passwords – changed regularly• Social networking sites

Social networking sites & messaging

• Again secure passwords – changed regularly• Check site security levels – eg on facebook (who do you

want seeing your information: friends or friends of friends or everyone?)

• No addresses• First name only?• Don’t announce you are going away• Don’t meet anyone met online face-face without telling

someone else

Personal policing• Secure browser• Secure passwords – changed regularly• Social networking sites• More secure operating system eg OS X or Linux• Firewall• Update all software• Anti-spy ware – Spy Bot• Adaware • Anti-virus eg AVG keep up to date• Don’t open an attachment from someone you don’t trust• Filters eg Net nanny

Main problems:

1. Transnational nature of the crimes. Most policing is local. 2. How much do the police understand the Internet and computer technology?3. Resources and person power are limited – how much time can the police devote to cyber crime?4. What responsibility do the ISPs have/ How can they enforce it?5. How much relies upon word of mouth and people reporting dodgy sites? 6. Are there better methods? Parents careful about how their children use the Internet. 7. Better educate children in safe surfing at school?8. Cheaper to educate parents; use firewalls, net filters and virus software up to date, use safer browsers eg Mozilla Firefox.

How many people have been prosecuted under the different laws?

How much does it cost to police and prosecute under the different laws?

What problems do the organisations face?

How do the organisations link up?

Some key issues to be researched:

top related