Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Computer Crimes and Security Professor Matt Thatcher.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information Warfare Theory of Information Warfare
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Cyber-Warfare: The Future is Now!
CYBER CRIME AND SECURITY TRENDS
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Copyright ©2006 by the Association of Certified Fraud Examiners, Inc. 1.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Hurdles in implementation of cyber security in India.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Information Warfare Playgrounds to Battlegrounds.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Security Mindset Lesson Introduction Why is cyber security important?
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
City of London 1 Understanding Cybercrime Risk 21 April 2016 Chris Keesing.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crime and security issues
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Hackers and Crackers iJacsn.
Association of Integrated Schools Bursars Conference
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
CSI Survey 2007 Tiffany Gorman
Computer Crime and Security Measures
Protecting Your Company’s Most Valuable Asset
MIS650 Introduction.
Presentation transcript:

Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

  Explain how cyber hacking and economic espionage has evolved over the past century  Examples of hacker groups  Examples of victims of hacking and economic espionage  Acts and Regulations  Prevention Goals of Presentation

  Importance to accounting students and business professionals.  Huge threat to companies, domestic and global.  Growth of technology and reliance on information-based systems. Importance

What is a Hacker? “A person who finds weaknesses in a computer system and exploits it.” “Someone involved in the exploration of technology.”

Hacker Groups Warelords Midwest Pirates Guild 414’s Legion of Doom Many more…….

  Until it was passed, breaking into computer systems was not an illegal or criminal act.  Passed by Congress in 1986  Hacking IS a CRIME!!!! Computer Fraud & Abuse Act

  Operation Sundevil  Secret Services began raiding and arresting hackers  Involved in credit card theft, telephone and wire fraud Operation Sundevil

  DOS attacks  Viruses  Malware - Worms Evolution of Hacking

  Black Hat Hackers – Malicious  White Hat Hackers – Ethical hackers  Grey Hat Hackers Types of Hackers

  Misappropriation of assets  Inventory theft  Insider trading  Credit card fraud  False invoices  Revenue misstatement  Expense account abuse Effects of Hacking on a Co.

  Accountants must be aware of the threats  Internal auditors must develop processes and controls to prevent hacks  Must work with external auditors to identify security controls  Advances in technology increased opportunities for fraud Importance for Accountants

  Fierce competitive pressures  Improvements in eavesdropping technology  Weakest link: Employees Motivation for Economic Espionage

 Most Publicized Cases  Toshiba vs. Lexar  Davis vs. Gillette  Reuters vs. Bloomberg

  Passed in 1996  Failed to curtail the problem  Companies were reluctant to seek prosecution Economic Espionage Act

  SOX Section 404  Proactive and reactive approach  Strong internal auditing department  Strong IT controls  Physical access controls  Employee training Ways to Reduce Hacking and EE

 Companies that implement strong IT controls, physical access controls, nondisclosure agreements and background checks make it harder for hackers or employees to breach systems and acquire proprietary information. In Conclusion

 QUESTIONS?