Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Northside I.S.D. Acceptable Use Policy
Introduction and Overview of Digital Crime and Digital Terrorism
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov by Suzanne Mello
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology Ethical Challenges
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Securing Information Systems
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
PART THREE E-commerce in Action Norton University E-commerce in Action.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Computer Programming I
Cyber crime & Security Prepared by : Rughani Zarana.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Mrs. Jefferson Business Information Management I.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS Do you know the difference between right and wrong?
Security Issues, Ethics, & Emerging Technologies in Education
Information Warfare Playgrounds to Battlegrounds.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Digital Citizenship. Scenario #1 – A student sends an annoying to another student. The receiving student gets even with a “flaming .” Is.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Cyber Crime – “Is the Internet the new “Wild Wild West?”
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
Cyber Crime Prepared for the Southern Massachusetts E-Commerce Network Nov by Suzanne Mello
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber Crime – “Is the Internet the new “Wild Wild West?” CJ216 Unit 8 Semina r.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Cyber crime and security issues
Computer Ethics IT Fundamentals Battlefield High School.
Securing Information Systems
Computer Ethics and Research
DIGITAL CITIZENSHIP What You Should Know!.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Seminar On Cyber Crime Submitted To: Submitted By:
Securing Information Systems
Chapter 13 Security and Ethical Challenges.
Philip Nichilo Vincent Carestia
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary information (whether a simple user ID and password or a trade secret worth millions of dollars) 4.Financial fraud using computers 5.Sabotage of data or networks 6.Disruption of network traffic (e.g., denial of service attacks) 7.Creation and distribution of computer viruses 8.Software piracy 9.Identity theft 10.Hardware theft (e.g., laptop theft 11.Terrorists that target critical infrastructures, such as the PSTN, power grid, and the air traffic control system

Financial Loss (FBI, 2004) How to Prevent Cyber Crime

Top Cyber Crimes that Attack Business ( SpamViruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking Cyber Crime – “Is the Internet the new “Wild Wild West?” Computer used to commit a crime –Child porn, threatening , assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking Computer Forensics What is it? an autopsy of a computer or network to uncover digital evidence of a crimean autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of lawEvidence must be preserved and hold up in a court of law

Ethics: a set of principals of right conduct. The American Heritage Dictionary 2000 Ethics: Motivation based on ideas of right and wrong. Wordnet 1.6 Princeton University 1997 What is cyberethics? Ethical or Unethical? A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the picture A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students. A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper. She turns the paper in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site. A student uses another student’s project website as a guideline. A student copies a previous published story in his own handwriting and submits it as his own work. (Sherri Shade) General conception of right/wrong that transcend religion and law (Webster’s Dictionary, 2001)

What is cyberethics? The study of moral, legal, ethical issues involving the use of use of information and communication technologies (Tavani di dalam Yu-Che Chen- Iowa State University) Cyber Ethics: application of ethics into the online environment (Ethics Connection, 2000) Codes of Conduct Computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology (Gordana Dodig-Crnkovic, 2004)  Association of Computing Machinery (ACM)  American Information Technology Professionals  Software Engineering  IEEE