A Gift of Fire Third edition Sara Baase

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Consumer Powers and Protections
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protecting Your Identity: What to Know, What to Do.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
Social Implications of a Computerized Society Lecture 4 Computer Crime Instructor: Oliver Schulte Simon Fraser University.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
A Gift of Fire Third edition Sara Baase
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
A Gift of Fire Fourth edition Sara Baase
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Crime CS4020.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
How It Applies In A Virtual World
Beware! Consumer Fraud Module 9.1.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
IS 490 Notes for Baase Textbook, Chapter 5. Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
By: Chris Simpson, Julie Dunbar, and Thomas Taylor.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Theft How bad people get good credit. Lindsey Bertugli.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Oklahoma’s Personal Financial Literacy Passport
Protecting Your Credit Identity
Computer Security Fundamentals
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
Consumer Economics Chapter 11
Protecting Your Identity:
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Chapter 11 crime and security in the networked economy
CHAPTER 33 Cyberlaw.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
When you get caught for Identity Theft
Scams, Identity Theft, and Viruses Kelly & Caitlin
Shopping experience! Is it safe to pay online? Ian Ramsey
Who Uses Encryption? Module 7 Section 3.
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Protecting Yourself from Fraud including Identity Theft
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

A Gift of Fire Third edition Sara Baase Chapter 5: Crime 2018/11/27 Slides prepared by Cyndi Chie and Sarah Frye

What We Will Cover Identity Theft and Credit Card Fraud Scams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web 2018/11/27

Identity Theft and Credit Card Fraud Stealing Identities: Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person Use credit/debit card numbers, personal information, and social security numbers 18-29 year-olds are the most common victims because they use the web most and are unaware of risks E-commerce has made it easier to steal card numbers and use without having the physical card 2018/11/27

Identity Theft and Credit Card Fraud (cont.) Stealing Identities (cont.): Techniques used to steal personal and financial information Phishing - e-mail fishing for personal and financial information disguised as legitimate business e-mail Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft 2018/11/27

Identity Theft and Credit Card Fraud (cont.) Stealing Identities (cont.): Techniques used to protect personal and financial information Activation for new credit cards Retailers do not print the full card number and expiration date on receipts Software detects unusual spending activities and will prompt retailers to ask for identifying information Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger 2018/11/27

Identity Theft and Credit Card Fraud (cont.) Responses to Identity Theft: Authentication of e-mail and Web sites Use of encryption to securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security 2018/11/27

Identity Theft and Credit Card Fraud (cont.) Biometrics: Biological characteristics unique to an individual No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed 2018/11/27

Scams and Forgery Auctions: FTC reports that online auction sites are one of the top sources of fraud complaints Some sellers do not send items or send inferior products Shill bidding is used to artificially raise prices Sellers give themselves or friends glowing reviews to garner consumer trust Auction sites use various techniques to counter dishonest sellers 2018/11/27

Scams and Forgery (cont.) Click fraud - repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget Stock fraud - most common method is to buy a stock low, send out e-mails urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment 2018/11/27

Crime Fighting Versus Privacy and Civil Liberties Search and Seizure of Computers: Requires a warrant to search and seize a computer The Issue of Venue: Charges are generally filed where the crime occurs Laws differ between states and countries The FBI usually files in the state where the crime was discovered and the investigation began 2018/11/27

Crime Fighting Versus Privacy and . . . (cont.) Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography, fraud, hacking and other online fraud Treaty sets common standards or ways to resolve international cases 2018/11/27

Whose Laws Rule the Web When Digital Actions Cross Borders: Laws vary from country to country Corporations that do business in multiple countries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal 2018/11/27

Whose Laws Rule the Web (Cont.) Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA (Digital Millennium Copyright Act) when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain) 2018/11/27