Securing the Electronic Frontier Ch. 6 Reading: pp. 191-6; 198-201; 218-9 CS 340.

Slides:



Advertisements
Similar presentations
Computer Crimes and Security Professor Matt Thatcher.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Copyright © 2008 Pearson Education Canada Inc Future Directions and Emerging Trends Chapter 12.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Threats and Attacks Principles of Information Security, 2nd Edition
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
CYBER CRIME AND SECURITY TRENDS
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Unit 4 – Impact of the use of IT on Business Systems.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber crime & Security Prepared by : Rughani Zarana.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
C8- Securing Information Systems
Unethical use of Computers and Networks
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Security and Ethics Privacy Employment Health Crime Working
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Cybercrime What is it, what does it cost, & how is it regulated?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
A threat to global security and economy Koushik Mannepalli CMPE 294.
Security and Ethics Safeguards and Codes of Conduct.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
Information Systems Week 7 Securing Information Systems.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Hacktivism Social Activism and Electronic Access.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Cyber crime and security issues
Securing Information Systems
The Disadvantages of ICT
IT Security  .
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 11 crime and security in the networked economy
CHAPTER 4 Information Security.
Securing Information Systems
Five Unethical Uses of Computers
Update on the Computer Fraud and Abuse Act
A Gift of Fire Third edition Sara Baase
Prepared By : Binay Tiwari
The Crime and Deviance Channel
LO1 - Know about aspects of cyber security
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340

The Net Challenging the sale of virus do-it-yourself kits – Only illegal to release a virus Computer Fraud and Abuse Act P. 192, Internet’s fragile infrastructure: susceptible to – Phishing attacks – Viruses (self-replicating programs) – Worms (independent programs that travel) The Slammer worm –

Defining cybercrime Criminal acts executed using computer and network technologies 1.Software piracy: unauthorized duplication 2.Computer sabotage: interference with computer systems – Viruses and worms – DoS attacks: mock requests to take down server 3.Electronic break-ins: – Computer espionage – trespass

Electronic break-ins Trespass in cyberspace – Computer Fraud and Abuse Act, p. 199 Protects the confidentiality and makes it a crime to access a computer w/o authorization – Now applies to most any computer ki/Computer_Fraud_and_A buse_Act ki/Computer_Fraud_and_A buse_Act Max penalty: 20 yrs & $250k fine Computer Fraud and Abuse Act 18 USC Section 1030 criminalizes: – Transmitting code (virus, worm) that damages a sys – Accessing w/o authorization any computer connected to Internet (n.b. does not req anything to be examined, changed or copied) – Transmitting classified info – Trafficking passwords – Computer fraud & extortion

Interference w/ systems: Trespass to chattels? Another successful claims of trespass to chattels: – Ebay v. Bidder’s Edge, p. 204, case study pp.218-9

Hacktivism Blend of hack and activism Malicious hacking for electronic political activism – Non-violent use of digital tools for political ends Typical actions, examples: – Defacing websites Defacing websites – Denial of service attacks Electronic Civil Disobedience (virtual sit-ins)