Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Let’s Talk About Cyber Security
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Crimes Against Property 1.Grab an iPad 2. Tap on the Big L app 3. Log into the blog (log-ins) 4. Answer the Crimes Against Property Questions.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Defining the Boundaries of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace Herman T. Tavani.
Chapter 14 Crime and Justice in the New Millennium
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 10 Privacy and Security McGraw-Hill
A Gift of Fire, 2edChapter 7: Computer Crime1 Social, Legal, and Ethical Issues for Computers and the Internet By: Ramon Hernandez Eugene Flock Zhonghui.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer Security, Ethics and Privacy Chapter 11.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Unethical use of Computers and Networks
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Lawsuits -Type of Civil Court Case -Lawsuits are when one person sues another for damages -Property Disputes -Contract Issues -Divorce -Negligence -Personal.
Lawsuits -Lawsuits are when one person sues another for damages -Property Disputes -Contract Issues -Divorce -Negligence-- Term explaining the idea that.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
List as many school rules as you can think of
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Computer Crimes Career & Technology Education Department.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CRIMES AGAINST PROPERTY
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
CONTROLLING INFORMATION SYSTEMS
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Security and Ethics Safeguards and Codes of Conduct.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
What is ‘Crime’?.
IT Security  .
PowerPoint® Slides to Accompany
A Project on CYBER SECURITY
Crime in the United States
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Systems in Organizations 3.3 Digital Business Innovation
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Crime in the United States
Crime in the United States
Presentation transcript:

Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and Information Hiding

Computer crime Different concepts appeared, for example: Hacking Hacking Fraud خداع Fraud خداع Embezzlement اختلاس Embezzlement اختلاس Sabotage التخريب Sabotage التخريب Identity Theft Identity Theft Forgery التزييف Forgery التزييف Denial of Service Denial of Service Viruses Viruses Piracy of copyrighted materials Piracy of copyrighted materials

What is a computer crime? Some people believe that there is nothing special about crimes that involve computers, and there is no need to have the concept “ Computer crime ”. What do you think? Some people believe that there is nothing special about crimes that involve computers, and there is no need to have the concept “ Computer crime ”. What do you think? There have been times that it was thought any crime involving a computer was a computer crime There have been times that it was thought any crime involving a computer was a computer crime Is a murder involving the use of a scalpel automatically an issue in medical ethics just because a medical instrument was used? Is a murder involving the use of a scalpel automatically an issue in medical ethics just because a medical instrument was used?

What is a computer crime? Computer crime is : “ a criminal act that can be carried out only through the use of computer technology ” Computer crime is : “ a criminal act that can be carried out only through the use of computer technology ” With this, the theft of a computer hardware device (printer), theft of an automobile full of microprocessors would not be a computer crime b/c the computer is not the principal tool for carrying out the crime With this, the theft of a computer hardware device (printer), theft of an automobile full of microprocessors would not be a computer crime b/c the computer is not the principal tool for carrying out the crime Similarly, breaking into the computer lab, vandalizing a computer system in the lab, these three examples are not computer crimes using this definition Similarly, breaking into the computer lab, vandalizing a computer system in the lab, these three examples are not computer crimes using this definition

Quick History of Computer Crimes Phase One: The early years Phase One: The early years 1960s and 1970s. 1960s and 1970s. Originally, hacker referred to a creative programmer wrote clever code. Originally, hacker referred to a creative programmer wrote clever code. The first operating systems and computer games were written by hackers. The first operating systems and computer games were written by hackers. The term hacking was a positive term. The term hacking was a positive term. Hackers were usually high-school and college students. Hackers were usually high-school and college students.

Quick History of Computer Crimes Phase Two: Hacking takes on a more negative meaning. Phase Two: Hacking takes on a more negative meaning. 1970s through 1990s. 1970s through 1990s. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Early computer crimes were launched against business and government computers. Early computer crimes were launched against business and government computers.

Quick History of Computer Crimes Phase Three: The Web Era Phase Three: The Web Era Beginning in the mid-1990s. Beginning in the mid-1990s. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. Crimes include the release of malicious code (viruses and worms). Crimes include the release of malicious code (viruses and worms). Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Hackers with minimal computer skills can create a lot of damage by using malicious code written by others. Hackers with minimal computer skills can create a lot of damage by using malicious code written by others.

Hactivism: Hactivism is the use of hacking expertise to promote a political cause. Hactivism is the use of hacking expertise to promote a political cause. This kind of hacking can range from mild to destructive activities. This kind of hacking can range from mild to destructive activities. Some consider hactivism as modern-age civil disobedience. Some consider hactivism as modern-age civil disobedience. Others believe hactivism denies others their freedom of speech and violates property rights. Others believe hactivism denies others their freedom of speech and violates property rights. Do you think that hactivism is ethical? Do you think that hactivism is ethical?

Today: Far fewer individuals and organizations are sympathetic to the causes of computer hackers Far fewer individuals and organizations are sympathetic to the causes of computer hackers Why? Possibly the growing dependence of citizens on the Internet Why? Possibly the growing dependence of citizens on the Internet A growing concern that cyberspace must become more secure and that hacking should not be tolerated A growing concern that cyberspace must become more secure and that hacking should not be tolerated

Questions About Penalties Intent Intent Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Age Age Should underage hackers receive a different penalty than adult hackers? Should underage hackers receive a different penalty than adult hackers? Damage Done Damage Done Should the penalty correspond to the actual damage done or the potential for damage? Should the penalty correspond to the actual damage done or the potential for damage?

Security can be improved by: Ongoing education and training to recognize the risks. Ongoing education and training to recognize the risks. Better system design. Better system design. Use of security tools and systems. Use of security tools and systems. Challenging “ others ” to find flaws in systems. Challenging “ others ” to find flaws in systems. Writing and enforcing laws that don ’ t impede research and advancement. Writing and enforcing laws that don ’ t impede research and advancement.