COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Information Security EDU IT Security Terms EDU
Computer Crimes and Security Professor Matt Thatcher.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Prepared by: Nahed Al-Salah
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
CYBER CRIME AND SECURITY TRENDS
Issues Raised by ICT.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Cyber crime & Security Prepared by : Rughani Zarana.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Computer Crimes Career & Technology Education Department.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
MIS323 – Business Telecommunications Chapter 10 Security.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Add video notes to lecture
Answer the questions to reveal the blocks and guess the picture.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
BCT 2.00 Analyze Technology Issues
Prepared By : Binay Tiwari
Societal Issues in Computing (COMP466)
Philip Nichilo Vincent Carestia
Communicating Through the Internet and Other Technologies
Ethical Use of Computers
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

COMPUTER CRIME An Overview

Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures

Evolution of the Information Age I. Background & History u Growth Projections u Internet u The Inevitable u Growth Projections u Internet u The Inevitable

Escalation and Frequency 5-year increase I. Background & History

Escalation and Frequency FBI Computer Crimes Division Reports: 15 security breaches every day 75% annual increase in recent years FBI Computer Crimes Division Reports: 15 security breaches every day 75% annual increase in recent years I. Background & History

Escalation and Frequency Department of Defense Study # of successful system attacks (8932 attempts) attacks (8932 attempts) # of detections (out of 7860 successful attempts) I. Background & History

Intrusion Costs Ernst and Young Survey: More than 1/2 incurred a loss Each loss exceeded $100,000 Seventeen losses exceeded $1,000,000 Ernst and Young Survey: More than 1/2 incurred a loss Each loss exceeded $100,000 Seventeen losses exceeded $1,000,000 I. Background & History

Case Study Hacker Penetrates Citibank System I. Background & History

Case Study Hacker Penetrates Citibank System I. Background & History u The criminals u The crime u The result u The criminals u The crime u The result

Employees/Ex-employees % of crimes committed 80% II. Potential Criminals UsersUsers AnalystsAnalysts ProgrammersProgrammers 20%

Case Study III. Ethics Survey # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 115% in making copies of employers software. 2. I would copy software7541% (illegally) for my use. 3. A user is justified in 63% accessing / using the services ( of another company’s computer ) to his advantage.

Case Study III. Ethics Survey # Agreeing % Agreeing 4. I would crack a com-157% puter if I knew how. 5. There is nothing wrong2110% in writing a virus program to output the message “Have a nice day.” 6. Management can be so157% unfair at times that a person can be justified in erasing files. # Agreeing % Agreeing 4. I would crack a com-157% puter if I knew how. 5. There is nothing wrong2110% in writing a virus program to output the message “Have a nice day.” 6. Management can be so157% unfair at times that a person can be justified in erasing files.

Case Study III. Ethics Survey # Agreeing % Agreeing 7. I would adjust a157% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 136% with cracking another company’s computer to identify other customers to sell to. # Agreeing % Agreeing 7. I would adjust a157% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 136% with cracking another company’s computer to identify other customers to sell to.

Hacking IV. Criminal Activity The technical-minded crime

Viruses Nondestructive or Malevolent Nondestructive or Malevolent IV. Criminal Activity

Trojan Horse u History u Vehicle for viruses and logic bombs u History u Vehicle for viruses and logic bombs IV. Criminal Activity

Fraud and Abuse Case Studies IV. Criminal Activity u Race Track Trifecta u Huntsville Prison u Robin Hood of Northwest u Race Track Trifecta u Huntsville Prison u Robin Hood of Northwest

Theft Unauthorized software duplication IV. Criminal Activity

Corporate Espionage Increasing Threat Increasing Threat IV. Criminal Activity

Sabotage 25% of all crime committed 25% IV. Criminal Activity 75%

Education and Training u A Logical First Step V. Preventative Measures

Education and Training 10 Suggestions from Ernst and Young: u Confidentiality Statements u Regular Back-Ups u Policies and Procedures u Control Intranet Access. u Boot-level Passwords 10 Suggestions from Ernst and Young: u Confidentiality Statements u Regular Back-Ups u Policies and Procedures u Control Intranet Access. u Boot-level Passwords V. Preventative Measures

Education and Training 10 Suggestions from E & Y (continued): u Control Internet Access u Restrict Use of Internet u Classify Data u Secure All Computers u Require file-level Passwords 10 Suggestions from E & Y (continued): u Control Internet Access u Restrict Use of Internet u Classify Data u Secure All Computers u Require file-level Passwords V. Preventative Measures

Software u A Variety to Choose From u Positive Results Indianapolis Power & Light case study u A Variety to Choose From u Positive Results Indianapolis Power & Light case study V. Preventative Measures

Legal Ramifications u A Better Prepared Law Enforcement u New Laws With Harsher Penalties u A Better Prepared Law Enforcement u New Laws With Harsher Penalties V. Preventative Measures