SlideShare ist ein Scribd-Unternehmen logo
1 von 14
1
Computer crime
• The growth of use of computerised payment
systems – particularly the use of credit cards and
debit cards – has led to a rise in computer crime.
• Now that companies and people no longer use cash
as much as they did in the past, stealing money
using a computer has become more frequent.
• For this purpose ,there companies are using
following cards
• Credit
• Debit Store
• cash cards
• Magnet strip of account information.
2
Credit Cards
• Credit cards allow users to pay for
goods as and when they need them,
and then to pay a single bill (or part
of what is owed) at the end of a
month.
• instant credit against goods bought or cash
from ATM.
• Need to sign a receipt, signature checked,
receipt goes off to credit card company.
• Usually machine with telephone connection to
credit card company authorises the payment,
checks whether the customer has credit.
• If goods are bought over the telephone or
Internet there is no receipt until it arrives with
the goods.
• The owner chooses how much to pay off the
balance each month, subject to a minimum
payment. Interest is paid on unpaid balances.
3
Debit cards
• Debit cards have replaced cheques as a
means of payment, and the money is
taken out of the user’s bank account.
• They are also used to get cash from
cash machines (also known as
Automatic Teller Machines [ATM],
‘holes in the wall’, or bank machines).
• A debit card holder who is using an
Automatic Teller Machine to withdraw
money from their bank account
identifies themselves by the use of a
PIN (personal identification number).
• Although this should be more secure
than using a credit card, users often
use a PIN that they keep with their
debit card or allow strangers to watch
them input the numbers on the ATM
keypad.
4
Debit and credit card
use
• Since the introduction of debit
and credit cards in the 1980s,
there has been a continual battle
between the debit and credit card
providers – the banks and credit
card companies – and fraudsters.
• As each new security device has
been added, the fraudsters have
tried to find ways to get round
them.
• The first debit and credit
cards relied upon encrypted
(encoded) data that was
stored on magnetic tape on
the back of the card.
5
Debit and credit card use
• The growth on
Internet sales
meant that a
further security
device was needed,
and this led to the
introduction of a 3
digit check number
on the back of the
card.
6
Debit and credit card use
• This did little to
stop card fraud,
and the latest
security device is
the addition of a
computer chip that
contains encoded
information onto
credit and debit
cards.
7
Debit and credit card use
• The ‘chip and pin’ system
will prevent some computer
fraud, but it is likely that
fraudsters are already
developing ways to
overcome it.
• The next likely development
in debit and credit card
protection is to include
biometric data (e.g.
fingerprint or iris print data)
within the chip.
• As fingerprints and iris print
data is unique to an
8
FraudFraud means trying to trick someone in order to gain an advantage.
• Posing as someone from an official organisation such as a bank or
electricity company in order to get you to hand over your account
details.
• Creating 'spoof' websites that look like the real thing.
• For example, making a website that looks exactly like your bank's,
then getting you to enter your user name and password so that they
can be recorded by the fraudster.
• Promising a 'get rich quick' scheme if you pay for a pack, which
will supposedly contain all of the details that you need.
• Sending e-mails to get you to give over your personal or account
details or getting you to download a data keylogger
• Stealing your identity in order to pose as you to steal your money
or some other criminal activity.
Fraud
9
Credit card Fraud
• Criminals: obtain credit information from
computers holding credit card customer details.
• Transfer the magnetic strip from a lost or stolen
card. Steal cards from owner, or in the post.
• Get information from credit card receipts and
use details to order over the telephone.
• Unscrupulous businesses swiping the card more
than once.
10
Phantom Withdrawals
• When the bank customer receives their
statement there are withdrawals that they
were unaware of.
• The cardholder or their family may have
done some of these withdrawals, some
are the result of fraud where a criminal
has stolen the details.
11
Electronic fraud
• Use of computers to commit fraud for financial
gain.
• Set up false suppliers that trade, when the
payments are made the goods are non-existent,
and the payments are stolen.
• Careful recruitment of staff, careful checking of
companies to ensure they are legitimate.
• This is quite common on the Internet where the
individual
12
Software piracy
• One of the most lucrative examples of computer
crime is software piracy.
• This is the illegal copying of computer programs,
and it is very widespread.
• It is estimated that over 66% of the computer
software used in Europe is illegal.
• Although it does not seem very wrong to ‘steal’ a
computer program by copying it, the cost to the
computer programmers who have spent time and
money developing the software is high.
• Software piracy is now being treated as a very
serious crime, and the penalties can be severe
• The organisation in the UK responsible for
protecting software is FAST (Federation Against
Software Theft).
• They help the police and local trading standards
officers to enforce the law.
13
Copyright, Designs and Patents
Act (1989)
• This makes it a criminal offence to copy or
steal software.
• This includes:
– Copying or distributing software or manuals
without the permission of the copyright owner
(usually the software developer).
– Using purchased software covered by copyright
on more than one computer unless this is
permitted by the software licence.
– Encouraging or allowing people to copy or
distribute illegal copies of software.
• A person guilty of an offence under this act
may be sent to prison for up to ten years
and be fined!
14
Computer Misuse Act (1990)
• This act deals with:
– Deliberately infecting a computer system
with a virus.
– Using an employer’s computer to carry
out unauthorised work.
– Using a computer to commit software
piracy.
– Using a computer to hack into another
computer.
– Using a computer to commit a fraud.

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
Internet banking
Internet bankingInternet banking
Internet banking
msarifff
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
Siphiwe Msibi
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
Albert Hui
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the Caribbean
Giovanni James
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
 

Was ist angesagt? (20)

E banking and M-banking
E banking and M-bankingE banking and M-banking
E banking and M-banking
 
internet banking
internet banking internet banking
internet banking
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
 
E-banking
E-banking E-banking
E-banking
 
Banking servics
Banking servicsBanking servics
Banking servics
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the Caribbean
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 

Ähnlich wie 18 computers and the law

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY
Syeda Tabia
 

Ähnlich wie 18 computers and the law (20)

8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling
 
Banking
BankingBanking
Banking
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
WEB PAYMENT SYSTEM
WEB PAYMENT SYSTEMWEB PAYMENT SYSTEM
WEB PAYMENT SYSTEM
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Information security
Information securityInformation security
Information security
 
The Top 25 Payment Processing Terms
The Top 25 Payment Processing TermsThe Top 25 Payment Processing Terms
The Top 25 Payment Processing Terms
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Ec ch5 e payment system
Ec ch5 e payment systemEc ch5 e payment system
Ec ch5 e payment system
 
Unit 5
Unit 5Unit 5
Unit 5
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
Legal aspects of e-payments in india
Legal aspects of e-payments in indiaLegal aspects of e-payments in india
Legal aspects of e-payments in india
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
 
Cyber Laundering and the AML Directives
Cyber Laundering and the AML DirectivesCyber Laundering and the AML Directives
Cyber Laundering and the AML Directives
 
Eps
EpsEps
Eps
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY
 

Mehr von Khan Yousafzai

09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
Khan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
Khan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
Khan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
Khan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
Khan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
Khan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
Khan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
Khan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
Khan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
Khan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
Khan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
Khan Yousafzai
 

Mehr von Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 

Kürzlich hochgeladen

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Kürzlich hochgeladen (15)

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 

18 computers and the law

  • 1. 1 Computer crime • The growth of use of computerised payment systems – particularly the use of credit cards and debit cards – has led to a rise in computer crime. • Now that companies and people no longer use cash as much as they did in the past, stealing money using a computer has become more frequent. • For this purpose ,there companies are using following cards • Credit • Debit Store • cash cards • Magnet strip of account information.
  • 2. 2 Credit Cards • Credit cards allow users to pay for goods as and when they need them, and then to pay a single bill (or part of what is owed) at the end of a month. • instant credit against goods bought or cash from ATM. • Need to sign a receipt, signature checked, receipt goes off to credit card company. • Usually machine with telephone connection to credit card company authorises the payment, checks whether the customer has credit. • If goods are bought over the telephone or Internet there is no receipt until it arrives with the goods. • The owner chooses how much to pay off the balance each month, subject to a minimum payment. Interest is paid on unpaid balances.
  • 3. 3 Debit cards • Debit cards have replaced cheques as a means of payment, and the money is taken out of the user’s bank account. • They are also used to get cash from cash machines (also known as Automatic Teller Machines [ATM], ‘holes in the wall’, or bank machines). • A debit card holder who is using an Automatic Teller Machine to withdraw money from their bank account identifies themselves by the use of a PIN (personal identification number). • Although this should be more secure than using a credit card, users often use a PIN that they keep with their debit card or allow strangers to watch them input the numbers on the ATM keypad.
  • 4. 4 Debit and credit card use • Since the introduction of debit and credit cards in the 1980s, there has been a continual battle between the debit and credit card providers – the banks and credit card companies – and fraudsters. • As each new security device has been added, the fraudsters have tried to find ways to get round them. • The first debit and credit cards relied upon encrypted (encoded) data that was stored on magnetic tape on the back of the card.
  • 5. 5 Debit and credit card use • The growth on Internet sales meant that a further security device was needed, and this led to the introduction of a 3 digit check number on the back of the card.
  • 6. 6 Debit and credit card use • This did little to stop card fraud, and the latest security device is the addition of a computer chip that contains encoded information onto credit and debit cards.
  • 7. 7 Debit and credit card use • The ‘chip and pin’ system will prevent some computer fraud, but it is likely that fraudsters are already developing ways to overcome it. • The next likely development in debit and credit card protection is to include biometric data (e.g. fingerprint or iris print data) within the chip. • As fingerprints and iris print data is unique to an
  • 8. 8 FraudFraud means trying to trick someone in order to gain an advantage. • Posing as someone from an official organisation such as a bank or electricity company in order to get you to hand over your account details. • Creating 'spoof' websites that look like the real thing. • For example, making a website that looks exactly like your bank's, then getting you to enter your user name and password so that they can be recorded by the fraudster. • Promising a 'get rich quick' scheme if you pay for a pack, which will supposedly contain all of the details that you need. • Sending e-mails to get you to give over your personal or account details or getting you to download a data keylogger • Stealing your identity in order to pose as you to steal your money or some other criminal activity. Fraud
  • 9. 9 Credit card Fraud • Criminals: obtain credit information from computers holding credit card customer details. • Transfer the magnetic strip from a lost or stolen card. Steal cards from owner, or in the post. • Get information from credit card receipts and use details to order over the telephone. • Unscrupulous businesses swiping the card more than once.
  • 10. 10 Phantom Withdrawals • When the bank customer receives their statement there are withdrawals that they were unaware of. • The cardholder or their family may have done some of these withdrawals, some are the result of fraud where a criminal has stolen the details.
  • 11. 11 Electronic fraud • Use of computers to commit fraud for financial gain. • Set up false suppliers that trade, when the payments are made the goods are non-existent, and the payments are stolen. • Careful recruitment of staff, careful checking of companies to ensure they are legitimate. • This is quite common on the Internet where the individual
  • 12. 12 Software piracy • One of the most lucrative examples of computer crime is software piracy. • This is the illegal copying of computer programs, and it is very widespread. • It is estimated that over 66% of the computer software used in Europe is illegal. • Although it does not seem very wrong to ‘steal’ a computer program by copying it, the cost to the computer programmers who have spent time and money developing the software is high. • Software piracy is now being treated as a very serious crime, and the penalties can be severe • The organisation in the UK responsible for protecting software is FAST (Federation Against Software Theft). • They help the police and local trading standards officers to enforce the law.
  • 13. 13 Copyright, Designs and Patents Act (1989) • This makes it a criminal offence to copy or steal software. • This includes: – Copying or distributing software or manuals without the permission of the copyright owner (usually the software developer). – Using purchased software covered by copyright on more than one computer unless this is permitted by the software licence. – Encouraging or allowing people to copy or distribute illegal copies of software. • A person guilty of an offence under this act may be sent to prison for up to ten years and be fined!
  • 14. 14 Computer Misuse Act (1990) • This act deals with: – Deliberately infecting a computer system with a virus. – Using an employer’s computer to carry out unauthorised work. – Using a computer to commit software piracy. – Using a computer to hack into another computer. – Using a computer to commit a fraud.