Computer Crime and Security Measures Week 5 cont..

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer Fraud Chapter 5.
Computer Crimes and Security Professor Matt Thatcher.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Crime and Security in the Networked Economy Part 4.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
OWASP Principles for GIS Data Security Keeping your GIS data secure.
Security, Privacy, and Ethics Online Computer Crimes.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Computer Crime and CyberCrime Why we need Computer Forensics.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer Security, Ethics and Privacy Chapter 11.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 9 Enhancing Information/Computer Security.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
You. are at risk for the fastest growing crimes crime.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Computer Security By Duncan Hall.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Security and Ethics Safeguards and Codes of Conduct.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Information Systems Week 7 Securing Information Systems.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Add video notes to lecture
Ethical, Social, and Political Issues in E-commerce
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Who Uses Encryption? Module 7 Section 3.
Computer Crime Section 1.
Computer Crime and Security Measures
Security Measures Module 7 Section 1.
INFORMATION SYSTEMS SECURITY and CONTROL
Ethical Hacking.
Chapter # 3 COMPUTER AND INTERNET CRIME
Privacy, Security, and Ethics
Accounting Information Systems & Computer Fraud
Presentation transcript:

Computer Crime and Security Measures Week 5 cont.

Computer Crime uComputers make activities easier u including illegal activities uNew ways to commit old crimes uCrimes against u businesses - insiders and outsiders u hackers, competitors, criminal gangs

Crime uComputers make crimes u easier to commit u more devastating u harder to detect u doable from long distances

New Terms uVirus uWorm uTrojan Horse uTrap Door

Fraud and Embezzlement uEmbezzlement - fraudulent appropriation of property by a person to whom it has been entrusted uRequires u special knowledge u special programming skill u poor security

Fraud and Embezzlement uAided by u anonymity u complexities of modern transactions increase the opportunities

Defending Against Dishonest Employees uRotate responsibilities of employees with access to sensitive systems uUnique ID and password uLimit access to system uAudit trails uScreening and background checks of employees uGood security policies

Defending Against Fraud uImmediate checks on legitimate credit/debit cards uPrograms to detect unusual spending uHolograms and photos on cards uMagnetic or digital finger printing uPhysical hardware deterrents

Why is the Problem so Big? uMost customers do not want to verify ID uMost merchants don’t check uSecurity vs convenience

Sabotage and Information Theft uUnhappy employees uAttacks by competitors uWho else?

Nonmalicious Hacking uNo harm is done uService - exposes security weaknesses uHelp create need for tougher security uInformation wants to be free uSome companies are ripping us off

Harmless? uTime and effort are involved in tracking down the intruder and shut off means of access uVerifications of no damage uUncertainty that system is preserved uTrespassing is illegal

Mechanisms of Protection uPassword protection

Internet uMedium for researchers u open access u ease of use u ease of sharing uSecurity depended on trust uAttitudes about security have not caught up with the risk

Improving Security uAwareness of extent of problem uEducation of users uAcceptance of responsibility

Internet Protection uFirewall

Crime Laws uComputer technology challenged existing laws and led to new ones uLarceny uUse of computer time uNew laws uAccess and use of computer without authorization is illegal