forensic science informatics p3 m3 d3
DESCRIPTION
Slides for BTEC Applied Science (Forensics) unit 37TRANSCRIPT
![Page 1: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/1.jpg)
Forensic Science Informatics
Unit 37
![Page 2: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/2.jpg)
Forensic Science Informatics
• P3 describe crimes committed using the Internet
![Page 3: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/3.jpg)
Task 1• List crimes committed using the Internet• Choose five of the crimes and describe them. (How can they
be avoided?)Compile a glossary of computer crime/ sabotage terms The terms should include:
Clipper chip Trojan horse Encryption VirusLogic bomb WormPinging SpywareRemailer AdwareTrapdoor
![Page 4: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/4.jpg)
Computer crimes
![Page 5: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/5.jpg)
Task 2
• Policing the InternetExplain how the Internet is policed (M3)
![Page 6: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/6.jpg)
Task 2
• Policing the InternetExplain how the Internet is policed
![Page 7: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/7.jpg)
Task 2
• Policing the InternetExplain how the Internet is policed
![Page 8: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/8.jpg)
Task 2
• Policing the InternetExplain how the Internet is policed
![Page 9: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/9.jpg)
Explain
• Make plain and comprehensible• Requires details, examples and description• More than a few sentences!
![Page 10: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/10.jpg)
Internet
Internet
World Wide Web
![Page 11: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/11.jpg)
“Policed”
I keep six honest serving-men(They taught me all I knew);Their names are What and Why and When And How and Where and Who.
Rudyard Kipling
![Page 12: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/12.jpg)
Key questions
• What• Why• When• How• Where• Who
is policing the Internet?
do we police the Internet?do we police the Internet?
do we police the Internet?do we police the Internet?
polices the Internet?
![Page 13: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/13.jpg)
Key questions
• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Where do we police the Internet?• Who polices the Internet?
![Page 14: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/14.jpg)
Key questions
• What is policing the Internet?• Why do we police the Internet?• When do we police the Internet?• How do we police the Internet?• Who polices the Internet?
![Page 15: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/15.jpg)
Key questions
• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?
![Page 16: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/16.jpg)
Key questions
• What is policing the Internet?• Why do we police the Internet?• How do we police the Internet?• Who polices the Internet?
![Page 17: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/17.jpg)
Task 3
Evaluate the methods used for policing the Internet (D3)
![Page 18: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/18.jpg)
Task 3
Evaluate the methods used for policing the Internet (D3)
![Page 19: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/19.jpg)
Evaluate
Evaluate the methods used for policing the Internet (D3)
• What are the strengths and weaknesses?• How effective is it?• How it could be improved?• Should we police the Internet?
![Page 20: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/20.jpg)
Personal policing
• Secure browser• Secure passwords – changed regularly• Social networking sites
![Page 21: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/21.jpg)
Social networking sites & messaging
• Again secure passwords – changed regularly• Check site security levels – eg on facebook (who do you
want seeing your information: friends or friends of friends or everyone?)
• No addresses• First name only?• Don’t announce you are going away• Don’t meet anyone met online face-face without telling
someone else
![Page 22: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/22.jpg)
Personal policing• Secure browser• Secure passwords – changed regularly• Social networking sites• More secure operating system eg OS X or Linux• Firewall• Update all software• Anti-spy ware – Spy Bot• Adaware • Anti-virus eg AVG keep up to date• Don’t open an attachment from someone you don’t trust• Filters eg Net nanny
![Page 23: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/23.jpg)
Main problems:
1. Transnational nature of the crimes. Most policing is local. 2. How much do the police understand the Internet and computer technology?3. Resources and person power are limited – how much time can the police devote to cyber crime?4. What responsibility do the ISPs have/ How can they enforce it?5. How much relies upon word of mouth and people reporting dodgy sites? 6. Are there better methods? Parents careful about how their children use the Internet. 7. Better educate children in safe surfing at school?8. Cheaper to educate parents; use firewalls, net filters and virus software up to date, use safer browsers eg Mozilla Firefox.
![Page 24: Forensic Science Informatics P3 M3 D3](https://reader030.vdocuments.us/reader030/viewer/2022012910/54c0c4064a7959bf648b45a7/html5/thumbnails/24.jpg)
How many people have been prosecuted under the different laws?
How much does it cost to police and prosecute under the different laws?
What problems do the organisations face?
How do the organisations link up?
Some key issues to be researched: