Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.

Slides:



Advertisements
Similar presentations
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Advertisements

COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 10 Privacy and Security McGraw-Hill
Public Information Online. Timothy WhitneyCaroline Aaron.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Computer Security Fundamentals
Computer Security Fundamentals
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 4 th edition by.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 3 rd edition by.
Security Services Constitutional Issues in Private Security.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Chapter 11 Security and Privacy: Computers and the Internet.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Computer Ethics.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
 Facebook is a public social network, and employers think they have the right to view the information on Facebook.  One signs the ‘fine print’ allowing.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Cell Phone Forensics Investigator - ICFECI
Types of Law Chapter 15. Types of Law Common Law- law based on court decisions and past examples rather than legal code Common Law- law based on court.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Copyright © 2014 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin FUNDAMENTALS OF HUMAN RESOURCE MANAGEMENT 5 TH EDITION BY R.A.
Background Checks - Banking The information presented by Inquirehire is not intended to be legal advice. Inquirehire recommends that you consult with legal.
Computer Security Fundamentals
Computer Security Fundamentals
Social and environmental impact
How to Protect Yourself from ID Theft and Social Engineering
Technology, Careers, and Job Hunting
Computer Security Fundamentals
Presentation transcript:

Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 2 Chapter 13 Objectives Find contact information on the web Locate court records on the web Locate criminal records on the web Use Usenet newsgroups to gather information

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 3 Introduction Preceding chapters have examined these topics:  Identity theft  Hacking  Investigating potential employees

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 4 Introduction (cont.)  Identity theft Criminals use a small amount of information to garner more. Look at Internet techniques for finding additional information. Security personnel need to know how this is done to defend against it.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 5 Introduction (cont.)  Hacking Obtain information to social engineer or to guess passwords.  Investigating potential employees Calling references may not be enough. Hiring a private detective may be impractical.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 6 Introduction (cont.) Network administrators in particular must be investigated.  The network cannot keep out the person who set it up.  Information about his past from a source other than supplied references may affect the hiring decision.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 7 Introduction (cont.) The Internet is a valuable investigative tool.  Useful for finding out about potential employees, babysitters, and so forth.  Much of the information is free.  States have court records online.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 8 Introduction (cont.) Information is a two-edged sword.  An innocent person may use it for legitimate investigations.  A less scrupulous person may use it for identity theft or stalking.  Invasion of privacy has ethical, moral, and legal ramifications.  Practice searches on your own name unless you have written consent.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 9 General Searches Search to find addresses, phone numbers, or addresses       

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 10 Court Records and Criminal Checks Sex offender registries   You may not be able to base employment decisions on certain information.  Check with an attorney first.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 11 Court Records and Criminal Checks (cont.) Civil court records  Civil issues, as well as crimes, may make a person unsuitable for a particular job.  No centralized Web site for these issues.  Many states and Federal courts offer online records, for example:

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 12 Court Records and Criminal Checks (cont.) Other resources  The National Center for State Courts  The Law School at Emory University  Public record finder

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 13 Court Records and Criminal Checks (cont.) Other resources  Pacer  The Boost  State public access ctl.ncsc.dni.us/publicaccess/

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 14 Court Records and Criminal Checks (cont.) Other resources  Prison searches  Federal prison records  Public records  United Kingdom public records

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 15 Usenet Newsgroups on many subjects. Use Google “Groups” option. Anyone can post anything. Search for potential employees. Can be an important investigative tool. Information must be verified elsewhere.

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 16 Summary The Internet is a valuable investigative resource  To hackers and identity thieves  To employers of network administrators as well as babysitters Periodically check your own identity to see what information is available.