A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.

Slides:



Advertisements
Similar presentations
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Advertisements

COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT at Work Banking and Finance.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
A Gift of Fire, 2edChapter 7: Computer Crime1 Social, Legal, and Ethical Issues for Computers and the Internet By: Ramon Hernandez Eugene Flock Zhonghui.
Chapter 1 Introduction to Security
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
CYBER CRIME AND SECURITY TRENDS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Unethical use of Computers and Networks
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Technical Implementation: Security Risks
Identity Theft It’s a crime!
Securing Information Systems
Add video notes to lecture
PowerPoint® Slides to Accompany
Crimes against Property
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
Scams, Identity Theft, and Viruses Kelly & Caitlin
Who Uses Encryption? Module 7 Section 3.
PowerPoint® Slides to Accompany
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Internet Safety Vocabulary
PowerPoint® Slides to Accompany
INFORMATION SYSTEMS SECURITY and CONTROL
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Lesson 2- Protecting Yourself Online
Presentation transcript:

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime

A Gift of Fire, 2edChapter 7: Computer Crime2 Computers Are Tools Computers assist us in our work, expand our thinking, and provide entertainment. Computers Are Used to Commit Crimes Preventing, detecting, and prosecuting computer crime is a challenge.

A Gift of Fire, 2edChapter 7: Computer Crime3 Hacking Phase One: The early years 1960s and 1970s. Originally, hacker referred to a creative programmer wrote clever code. The first operating systems and computer games were written by hackers. The term hacking was a positive term. Hackers were usually high-school and college students.

A Gift of Fire, 2edChapter 7: Computer Crime4 Hacking (cont.) Phase Two: Hacking takes on a more negative meaning. 1970s through 1990s. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Early computer crimes were launched against business and government computers. Adult criminals began using computers to commit their crimes.

A Gift of Fire, 2edChapter 7: Computer Crime5 Hacking (cont.) Phase Three: The Web Era Beginning in the mid-1990s. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. Crimes include the release of malicious code (viruses and worms). Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Hackers with minimal computer skills can create havoc by using malicious code written by others.

A Gift of Fire, 2edChapter 7: Computer Crime6 Hacking (cont.) Security weaknesses can be found in the computer systems used by: businesses, government (classified and unclassified), and personal computers. Causes of security weakness: characteristics of the Internet and Web, human nature, inherent complexity of computer systems.

A Gift of Fire, 2edChapter 7: Computer Crime7 Hacking (cont.) Security can be improved by: Ongoing education and training to recognize the risks. Better system design. Use of security tools and systems. Challenging “others” to find flaws in systems.

A Gift of Fire, 2edChapter 7: Computer Crime8 Online Scams - Auctions Selling and buying goods online has become popular. Problems: sellers don’t send the goods, sellers send inferior goods, price is driven up by shill bidding, and illegal goods sold. Solutions: educate customers, read seller “reviews,” use third-party escrow, and more…

A Gift of Fire, 2edChapter 7: Computer Crime9 Fraud Credit-Card Stolen receipts, mailed notices, and cards. Interception of online transaction or weak e-commerce security. Careless handling by card-owner. ATM Stolen account numbers and PINs. Insider knowledge. A counterfeit ATM. Telecommunications Stolen long-distance PINs. Cloned phones.

A Gift of Fire, 2edChapter 7: Computer Crime10 Some Defenses Against Fraud Credit-Card Instant credit-card check. Analysis of buying patterns. Analysis of credit card applications (to detect identity theft). Verify user with Caller ID. ATM Redesigned ATMs. Limited withdrawal. Telecommunications match phone “signature” with serial number. identify phone without broadcasting serial number.

A Gift of Fire, 2edChapter 7: Computer Crime11 Identity Theft Some Causes of Identity Theft Insecure and inappropriate use of Social Security numbers. Careless handling of personally identifiable information. Weak security of stored records. Insufficient assistance to identity theft victims. Some Defenses for Identity Theft Limit use of personally identifiable information. Increase security of information stored by businesses and government agencies. Improve methods to accurately identify a person. Educate consumers.

A Gift of Fire, 2edChapter 7: Computer Crime12 Forgery Some Causes Powerful computers and digital manipulation software. High-quality printers, copiers, and scanners. Some Defenses Educate consumers and employees. Use anti-counterfeiting techniques during production. Use counterfeit detection methods. Create legal and procedural incentives to improve security.