Computer Crime and Security Measures

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

Computer Crimes and Security Professor Matt Thatcher.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Computer Crime and Security Measures Week 5 cont..
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
E-banking.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Chapter 11 Security and Privacy: Computers and the Internet.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Computer Crime and CyberCrime Why we need Computer Forensics.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer Security, Ethics and Privacy Chapter 11.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
You. are at risk for the fastest growing crimes crime.
Security and Ethics Safeguards and Codes of Conduct.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Information Systems Week 7 Securing Information Systems.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Ethical, Social, and Political Issues in E-commerce
Crimes against Property
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security in Networking
BCT 2.00 Analyze Technology Issues
Week 7 Securing Information Systems
Computer Crime Section 1.
Computer Security and Risks
NETWORK SECURITY.
Security Measures Module 7 Section 1.
Societal Issues in Computing (COMP466)
Planning and Security Policies
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Chapter # 3 COMPUTER AND INTERNET CRIME
Unit 1.6 Systems security Lesson 1
Privacy, Security, and Ethics
Accounting Information Systems & Computer Fraud
Presentation transcript:

Computer Crime and Security Measures Week 5 cont.

Computer Crime Computers make activities easier including illegal activities New ways to commit old crimes Crimes against businesses - insiders and outsiders hackers, competitors, criminal gangs

Crime Computers make crimes easier to commit more devastating harder to detect doable from long distances

New Terms Virus Worm Trojan Horse Trap Door

Fraud and Embezzlement Embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted Requires special knowledge special programming skill poor security

Fraud and Embezzlement Aided by anonymity complexities of modern transactions increase the opportunities Packet sniffers

Defending Against Dishonest Employees Rotate responsibilities of employees with access to sensitive systems Unique ID and password Limit access to system Audit trails Screening and background checks of employees Good security policies, whatever that is

Defending Against Fraud Immediate checks on legitimate credit/debit cards Programs to detect unusual spending Holograms and photos on cards Magnetic or digital finger printing Physical hardware deterrents

Why is the Problem so Big? Most customers do not want to verify ID Most merchants don’t check Security vs convenience

Sabotage and Information Theft Unhappy employees Attacks by competitors Who else?

Nonmalicious Hacking No harm is done Service - exposes security weaknesses Help create need for tougher security Information wants to be free Some companies are ripping us off

Harmless? Time and effort are involved in tracking down the intruder and shut off means of access Verifications of no damage Uncertainty that system is preserved Trespassing is illegal

Mechanisms of Protection Password protection

Internet Medium for researchers open access ease of use ease of sharing Security depended on trust Attitudes about security have not caught up with the risk

Improving Security Awareness of extent of problem Education of users Acceptance of responsibility

Internet Protection Firewall

Crime Laws Computer technology challenged existing laws and led to new ones Larceny Use of computer time New laws Access and use of computer without authorization is illegal