COMPUTER CRIME An Overview
Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures
Evolution of the Information Age I. Background & History u Growth Projections u Internet u The Inevitable u Growth Projections u Internet u The Inevitable
Escalation and Frequency 5-year increase I. Background & History
Escalation and Frequency FBI Computer Crimes Division Reports: 15 security breaches every day 75% annual increase in recent years FBI Computer Crimes Division Reports: 15 security breaches every day 75% annual increase in recent years I. Background & History
Escalation and Frequency Department of Defense Study # of successful system attacks (8932 attempts) attacks (8932 attempts) # of detections (out of 7860 successful attempts) I. Background & History
Intrusion Costs Ernst and Young Survey: More than 1/2 incurred a loss Each loss exceeded $100,000 Seventeen losses exceeded $1,000,000 Ernst and Young Survey: More than 1/2 incurred a loss Each loss exceeded $100,000 Seventeen losses exceeded $1,000,000 I. Background & History
Case Study Hacker Penetrates Citibank System I. Background & History
Case Study Hacker Penetrates Citibank System I. Background & History u The criminals u The crime u The result u The criminals u The crime u The result
Employees/Ex-employees % of crimes committed 80% II. Potential Criminals UsersUsers AnalystsAnalysts ProgrammersProgrammers 20%
Case Study III. Ethics Survey # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage.
Case Study III. Ethics Survey # Agreeing % Agreeing 4. I would crack a com-157% puter if I knew how. 5. There is nothing wrong2110% in writing a virus program to output the message “Have a nice day.” 6. Management can be so157% unfair at times that a person can be justified in erasing files. # Agreeing % Agreeing 4. I would crack a com-157% puter if I knew how. 5. There is nothing wrong2110% in writing a virus program to output the message “Have a nice day.” 6. Management can be so157% unfair at times that a person can be justified in erasing files.
Case Study III. Ethics Survey # Agreeing % Agreeing 7. I would adjust a157% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 136% with cracking another company’s computer to identify other customers to sell to. # Agreeing % Agreeing 7. I would adjust a157% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 136% with cracking another company’s computer to identify other customers to sell to.
Hacking IV. Criminal Activity The technical-minded crime
Viruses Nondestructive or Malevolent Nondestructive or Malevolent IV. Criminal Activity
Trojan Horse u History u Vehicle for viruses and logic bombs u History u Vehicle for viruses and logic bombs IV. Criminal Activity
Fraud and Abuse Case Studies IV. Criminal Activity u Race Track Trifecta u Huntsville Prison u Robin Hood of Northwest u Race Track Trifecta u Huntsville Prison u Robin Hood of Northwest
Theft Unauthorized software duplication IV. Criminal Activity
Corporate Espionage Increasing Threat Increasing Threat IV. Criminal Activity
Sabotage 25% of all crime committed 25% IV. Criminal Activity 75%
Education and Training u A Logical First Step V. Preventative Measures
Education and Training 10 Suggestions from Ernst and Young: u Confidentiality Statements u Regular Back-Ups u Policies and Procedures u Control Intranet Access. u Boot-level Passwords 10 Suggestions from Ernst and Young: u Confidentiality Statements u Regular Back-Ups u Policies and Procedures u Control Intranet Access. u Boot-level Passwords V. Preventative Measures
Education and Training 10 Suggestions from E & Y (continued): u Control Internet Access u Restrict Use of Internet u Classify Data u Secure All Computers u Require file-level Passwords 10 Suggestions from E & Y (continued): u Control Internet Access u Restrict Use of Internet u Classify Data u Secure All Computers u Require file-level Passwords V. Preventative Measures
Software u A Variety to Choose From u Positive Results Indianapolis Power & Light case study u A Variety to Choose From u Positive Results Indianapolis Power & Light case study V. Preventative Measures
Legal Ramifications u A Better Prepared Law Enforcement u New Laws With Harsher Penalties u A Better Prepared Law Enforcement u New Laws With Harsher Penalties V. Preventative Measures