Download presentation
Presentation is loading. Please wait.
1
Computer Crime and Security Measures
Week 5 cont.
2
Computer Crime Computers make activities easier
including illegal activities New ways to commit old crimes Crimes against businesses - insiders and outsiders hackers, competitors, criminal gangs
3
Crime Computers make crimes easier to commit more devastating
harder to detect doable from long distances
4
New Terms Virus Worm Trojan Horse Trap Door
5
Fraud and Embezzlement
Embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted Requires special knowledge special programming skill poor security
6
Fraud and Embezzlement
Aided by anonymity complexities of modern transactions increase the opportunities Packet sniffers
7
Defending Against Dishonest Employees
Rotate responsibilities of employees with access to sensitive systems Unique ID and password Limit access to system Audit trails Screening and background checks of employees Good security policies, whatever that is
8
Defending Against Fraud
Immediate checks on legitimate credit/debit cards Programs to detect unusual spending Holograms and photos on cards Magnetic or digital finger printing Physical hardware deterrents
9
Why is the Problem so Big?
Most customers do not want to verify ID Most merchants don’t check Security vs convenience
10
Sabotage and Information Theft
Unhappy employees Attacks by competitors Who else?
11
Nonmalicious Hacking No harm is done
Service - exposes security weaknesses Help create need for tougher security Information wants to be free Some companies are ripping us off
12
Harmless? Time and effort are involved in tracking down the intruder and shut off means of access Verifications of no damage Uncertainty that system is preserved Trespassing is illegal
13
Mechanisms of Protection
Password protection
14
Internet Medium for researchers open access ease of use
ease of sharing Security depended on trust Attitudes about security have not caught up with the risk
15
Improving Security Awareness of extent of problem Education of users
Acceptance of responsibility
16
Internet Protection Firewall
17
Crime Laws Computer technology challenged existing laws and led to new ones Larceny Use of computer time New laws Access and use of computer without authorization is illegal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.