Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.

Slides:



Advertisements
Similar presentations
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.
Lecture 11 Reliability and Security in IT infrastructure.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Data Security GCSE ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer Concepts – Illustrated 8th edition
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
What is Spam? d min.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Information Systems Week 7 Securing Information Systems.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Computer Security, Ethics and Privacy
Computer Security and Risks
Computer Security, Ethics and Privacy
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.

How Much Crime? Indetected Unreported Unprosecuted on the rise

Who? insiders / former insiders pranksters / hackers spies & thieves organized crime

Theft identity information money equipment software piracy intellectual property theft

MalWare malicious software. Trojan Horse - Logic / Time Bomb Virus – self replicates Worm – infects a network Spyware – transmits info

Dealing with Viruses 18,000+ viruses – 250 in the wild antivirus software networks – help the spread security patches – plug the holes dependence – increase the impact standardization – increase susceptibility

Hackers early hackers vs. today. motivation : curiosity challenge illustrate security weaknesses stealing information webjackers & hacktivism denial of service attacks

Security protecting computer systems & the information they contain. unwanted access, damage, modification, or destruction. computers do exactly what they are programmed to do : can be reprogrammed, and you must tell them how to protect themselves.

Access Restriction something you : –have : key, badge, card –know : password, id code, combination –do : habits, unique to you –are : biometrics used in combination

Passwords not using dictionary words mixed case requiring additional symbols requiring frequent changes

Encryption translation info to an unreadable form. protect digital data – computers, electronic commerce, wireless systems, Bluetooth devices, bank machines.

Firewalls gateway, entry point. lots of different approaches, filter some traffic. only let appropriate packets / traffic through.

Audit-control Software leaving & monitoring electronic footprints watch for suspicious behaviour

Protecting Against Failure Backups – multiple generations Surge Protector – power surges UPS – uninterrupted power supply Mirroring data / RAID

People are Risky don’t see themselves as a risk. work around security.

Reliability when we rely on computers, and something goes wrong, the impact can be significant : Therac 25 Y2K – $100 billion cannot find all of the bugs they harder bugs are to find, the worse they are may be. increased complexity compounds the problem.

Security vs. Privacy balancing. examples : – at work –cell phone with GPS –active badge