Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

What Are the Functions of ATM Machines?
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
ICT at Work Banking and Finance.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Financial Literacy Skills
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Copyright 2007 Thomson South-Western Chapter 5 Banking Procedures.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Unethical use of Computers and Networks
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
EFTPOS and credit card payments Rachel Garcia Line 4 Due:14 th November Business Admin Michael Barry.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Jeff loses his identity! Lesson 8: Identity Theft.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Electronic Banking & Security Electronic Banking & Security.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft It’s a crime!
Protecting Your Credit Identity
Take Charge of Your Finances
Take Charge of Your Finances
Electronic/Online Banking & Bill Pay
PowerPoint® Slides to Accompany
When you get caught for Identity Theft
Five Unethical Uses of Computers
PowerPoint® Slides to Accompany
Computer Crime Section 1.
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Take Charge of Your Finances
Take Charge of Your Finances
Take Charge of Your Finances
Presentation transcript:

Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase

Fraud Credit card fraud Identity Theft ATM Fraud Some solutions Finish Embezzlement Sabotage Industrial espionage Trust the systemrust the system Digital Forgery Fighting the problem

Credit card fraud Stealing of credit card numbers by store clerks, thieves searching trash near stores, or fake phone calls. Use of counterfeit cards – reprogramming the magnetic strip with a different account number. Stealing numbers from the web – on transmission or from stored files. (electronic shoplifting) Also: Some users claim not to have ordered or received a good they have ordered.

Why do these frauds occur? Customers do not want to take the time to provide full identification or wait while the merchants check it. Customers may be offended by requests for ID. Looses from most credit cards are absorbed by the credit card issuers, not the merchant => the merchant does not have much incentive to check the cards. On the Web the charges have to be absorbed by the merchant as there is no customer’s signature.

Identity Theft Our identity is now a number. Consequences of identity theft may cause little money loss but great anguish including: –Loose a good credit rating –Be prevented from borrowing money –Be prevented from cashing checks –Loose a job –Be unable to rent an apartment –Be sued by creditors to whom the criminal owes money.

ATM Fraud Thieves need the PIN number from a customer and the card (or a copy of the card) Click for an example (in Spanish)an example

Telecommunications Fraud Using robbed calling card numbers. Cloning cellular phones (making them transmit another user’s serial number at the beginning of each call.

Preventing credit card fraud Companies keep a record of stolen cards in the computer and stores are now connected to the company computer. New cards sent by post require the user to enter specific identification data before the card is activated. (or even use caller ID to recognize the users’ home phone number) Software recognizes unusual spending activity.

Preventing ATM Fraud Redesigning ATM to make the keyboard less visible There is a limit for cash withdrawal. High activity at a particular machine is checked. Banks stopped printing the complete account number on receipts.

Fraudulent appropriation Embezzlement is “fraudulent appropriation of property by a person to whom it has been trusted”.

Why? Complexity of modern transactions increase the opportunity for embezzlement. The complexity and anonymity of computers help hide scam. Victims: Banks Brokerage houses Insurance companies Large financial institutions

Examples: Employees of insurance companies set up phoney insurance policies and make claims on them. Employees transfer large sums to Swiss bank accounts. Employees create fake purchase orders for purchases from phoney companies and cash the checks themselves. Employees steal data from their employer’s computer and sell it to competitors.

Sabotage The motivation for sabotage is not new, what is new is the ease with which a great amount of damage can be done using a computer. The lack of violence or physical destruction might make the crime seem less serious both to its perpetrators and to jurors.

Reasons for sabotage: Employees who are fired or angry at their employees sabotage computer systems Files may be destroyed Logic bombs may be planted (software that destroys critical files) A system is sabotaged in the hope to be called and paid to fix it. Wanting to feel powerful or make people miserable.

Protection: Employees with access to sensitive systems should be rotated. Each employee should have its own user ID and password. ID’s should limit the user’s activity to the actions the employee needs to perform. No one person should have access to many parts of a system.

Industrial espionage Large quantities of digital information can be copied quickly. There is no indication that a theft took place – nothing is missing. Insiders are paid for passwords – and the spying can be accomplished from a remote location.

Trusting the system The intent to steal is not in the computer, but computers can make cheating harder to identify and correct. Some people trust the computer Others are suspicious of anything that comes out of the machine. We should trust or distrust the company that is the owner of the computer system. Trust high ethical standards and care to avoid mistakes.

Digital Forgery Computer systems enable people to make fakes with relative ease. The equipment has improved in quality and prices have dropped. Forgery of paper documents will still be a problem for some time. Cyberspace will also have a problem with digital forgery

Crime fighting versus privacy Automated surveillance software to browse through chat rooms and web sites looking for suspicious activity and build a database of suspicious posting. The surveillance software monitors constantly. Is this an invasion to privacy?

Using biometrics Biometrics are biological characteristics that are unique to an individual. –Fingerprint, voice prints, face, hand geometry, retina scans and DNA Biometric technology for identification applications is rapidly developing. Some applications are for comfort but the most important are for security and fraud prevention.

Examples of use Opening a door by touching a scanner Using a face scanner to prevent a person from applying for an additional driver’s license or welfare benefits with different names. Thumbprint match to logon into a computer. Airports restrict access to certain areas with thumbprint checking..

Problems with biometrics Hackers may capture biometrics data and send the information to gain access. When a credit card number is stolen a new one is issued – a finger print cannot be changed. Increase use of biometrics can increase surveillance and tracking of activities by government agencies.