Computer Crime: Crime of the Information Age Valerie Russell CSCI 030 Delahunty.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Introduction and Overview of Digital Crime and Digital Terrorism
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
2 Language of Computer Crime Investigation
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Threats and Attacks Principles of Information Security, 2nd Edition
CYBER CRIME AND SECURITY TRENDS
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Computer Crime and CyberCrime Why we need Computer Forensics.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Cyber crime & Security Prepared by : Rughani Zarana.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 9 Enhancing Information/Computer Security.
First Look at Security and Privacy Jeremiah Burleson.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Computer Crimes Career & Technology Education Department.
BULD BRIGHT UNIVERSITY Faculty of Science and Technology Understanding Virus and Attack Techniques : ​​​ ​​​ ​​ ​​ ​ ​​ ​ ​​ ​​ ​​ ​ ​ ​ ​ ​ D1 ​ ​ ~​
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Cybercrime What is it, what does it cost, & how is it regulated?
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Cyber crime and security issues
Add video notes to lecture
Fundamentals of Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
BCT 2.00 Analyze Technology Issues
Ethical Use of Computers
Computer Security.
Presentation transcript:

Computer Crime: Crime of the Information Age Valerie Russell CSCI 030 Delahunty

2 What is computer crime? Computer crime is classified as a white- collar crime. Computer crime is classified as a white- collar crime. It is a crime in which computers are used as the instrument of the offense, or in which computers are the object of the offense. It is a crime in which computers are used as the instrument of the offense, or in which computers are the object of the offense. Computer crimes are generally placed in one of two categories: fraud or abuse.

3 Types of Computer Crime Computer as Instrument Computer as Object Theft by computer (using computer as a tool to steal) Damage to software/hardware (physical or electronic damage to computers or computer programs) Harassment/extortion (using computer as a means for intimidation or threats) Data alteration (changing information for undue advantage or revenge)

4 Areas of Computer Crime Currently, computer crime breaks down into six major areas: Trespass, 2% Theft of or denial of services, 10% Alteration of data, 12% Damage to software, 16% Theft of information or programs, 16% Theft of money, 44% (Source: National Center for Computer Crime Data)

5 Examples of “bad guy” tricks Bomb Bomb Data diddling Data diddling Denial of Service (DOS) attack Denial of Service (DOS) attack Piggybacking Piggybacking Salami technique Salami technique Scavenging Scavenging Trapdoor Trapdoor Trojan horse Trojan horse Zapping Zapping

6 Types of Perpetrators Insiders -Work for the company or organization -Have access to the physical and intellectual property of their employers -Are trusted Motivations -Financial gain -Revenge-Curiosity -Challenge of getting away with it

7 Types of Perpetrators cont’d Outsiders -Hackers -Vendors -Former employees -Competitors-Customers -Employees of associated businesses -Terrorists-Consultants -Political activists -Foreign government agents Motivations -Same as insider motivations -Revenge of a former employee -Competitors wanting inside information -New employees who provide information relative to their previous employer -Political agenda -Nationalistic economic pressures

8 Hackers US Dept of Justice describes hackers as: Between yrs old Between yrs old Predominantly men, with number of women increasing Predominantly men, with number of women increasing No prior criminal record No prior criminal record Target businesses and gov’t agencies’ systems Target businesses and gov’t agencies’ systems Bright, motivated, willing to accept challenges Bright, motivated, willing to accept challenges Fear ridicule, exposure and loss of status Fear ridicule, exposure and loss of status Usually work alone Usually work alone Hold a position of trust, usually first to arrive to work, last to leave Hold a position of trust, usually first to arrive to work, last to leave View criminal acts as a game View criminal acts as a game

9 A Hacker’s Motivation To learn about computers as a hobby To learn about computers as a hobby To defy authority To defy authority To respond to a challenge To respond to a challenge To “beat the system” To “beat the system” To cause disruption To cause disruption To show contempt for others To show contempt for others To show how smart they are To show how smart they are

10 Viruses Virus software is probably the most widely discussed class of computer threat. Virus software is probably the most widely discussed class of computer threat. In order to classify as a virus program, the code in the program must be able to replicate or copy itself so as to spread through the infected machine or across to other machines. In order to classify as a virus program, the code in the program must be able to replicate or copy itself so as to spread through the infected machine or across to other machines. Not all viruses are destructive. Not all viruses are destructive.

11 Types of Viruses Beneficial virus program Beneficial virus program Benign virus program Benign virus program Beastly virus programs: Beastly virus programs: Boot infections Boot infections System infectors System infectors Application program infectors Application program infectors Data infectors Data infectors

12 Typical Viruses Form Melissa Ripper Junkie MDMA Anti-CMOS Concept Monkey Cookie Monster One_Half Wazzu Michelangelo Cascade Jerusalem

13 Magnitude of the Computer Crime Problem The threat of computer crime is growing as computers become a bigger part of our everyday lives. The threat of computer crime is growing as computers become a bigger part of our everyday lives. U.S. organizations lose billions of dollars each year, but it is difficult to determine exactly how much for several reasons: U.S. organizations lose billions of dollars each year, but it is difficult to determine exactly how much for several reasons:

14 Magnitude of problem cont’d. Difficulty in detecting when a system has been invaded or affected. Difficulty in detecting when a system has been invaded or affected. Those crimes that are detected are never reported to the authorities an estimated 85% of the time. Those crimes that are detected are never reported to the authorities an estimated 85% of the time.

15 Investigating Computer Crime Determine that a crime has taken place Determine that a crime has taken place Preserve evidence Preserve evidence Estimate financial loss Estimate financial loss Determine expertise needed for assistance Determine expertise needed for assistance Identify suspects and witnesses Identify suspects and witnesses File complaint and claim File complaint and claim

16 Prevention and Security Protect with passwords to gain entry to system or site Protect with passwords to gain entry to system or site Anti-virus software and other security software Anti-virus software and other security software Secured waste, paper shredding Secured waste, paper shredding Back up files Back up files Protect personal information and make sure site is secure Protect personal information and make sure site is secure Protect physical areas from unauthorized entry, equipment from being accessed, video cameras Protect physical areas from unauthorized entry, equipment from being accessed, video cameras Federal legislation Federal legislation

17 Instances of Computer Crime The U.S. Department of Defense computers are attacked more than 200,000 times per year. The U.S. Department of Defense computers are attacked more than 200,000 times per year. A controller at Halifax Technology Services admitted embezzling $15 million by generating corporate checks to herself over a period of three years. A controller at Halifax Technology Services admitted embezzling $15 million by generating corporate checks to herself over a period of three years. Of the $40 million of counterfeited money seized in 1998, $16 million of it was computer generated. Of the $40 million of counterfeited money seized in 1998, $16 million of it was computer generated.

18 Donald Burleson inserted a virus into the computer system at a brokerage where he had been fired. The virus erased 168,000 sales commission records. Donald Burleson inserted a virus into the computer system at a brokerage where he had been fired. The virus erased 168,000 sales commission records. Robert Morris, released a macrovirus that brought more than 6,000 university, research and military computers to a standstill, causing millions of dollars in damage. Robert Morris, released a macrovirus that brought more than 6,000 university, research and military computers to a standstill, causing millions of dollars in damage. An executive at Squibb and Sons, Inc., plead guilty to fraud in a scheme to steal more than $1 million of merchandise from the company. An executive at Squibb and Sons, Inc., plead guilty to fraud in a scheme to steal more than $1 million of merchandise from the company. A brokerage clerk transformed 1700 shares of his own stock, worth $1.50 per share, to the same number of shares in another company worth 10 times that much. A brokerage clerk transformed 1700 shares of his own stock, worth $1.50 per share, to the same number of shares in another company worth 10 times that much. A 14 year old boy broke into the computer of Citibank and used access codes to order more than $11,000 of merchandise, and had it sent to a post office box. A 14 year old boy broke into the computer of Citibank and used access codes to order more than $11,000 of merchandise, and had it sent to a post office box.

19 Conclusion Because of technological advances and society’s growing reliance on computers, computer crime is sure to become a part of almost all types of crime in the near future. Precautionary measures must be taken. Because of technological advances and society’s growing reliance on computers, computer crime is sure to become a part of almost all types of crime in the near future. Precautionary measures must be taken.