Download presentation
Presentation is loading. Please wait.
Published byVictor Lewis Modified over 9 years ago
1
Computer Crime and Security Measures Week 5 cont.
2
Computer Crime uComputers make activities easier u including illegal activities uNew ways to commit old crimes uCrimes against u businesses - insiders and outsiders u hackers, competitors, criminal gangs
3
Crime uComputers make crimes u easier to commit u more devastating u harder to detect u doable from long distances
4
New Terms uVirus uWorm uTrojan Horse uTrap Door
5
Fraud and Embezzlement uEmbezzlement - fraudulent appropriation of property by a person to whom it has been entrusted uRequires u special knowledge u special programming skill u poor security
6
Fraud and Embezzlement uAided by u anonymity u complexities of modern transactions increase the opportunities
7
Defending Against Dishonest Employees uRotate responsibilities of employees with access to sensitive systems uUnique ID and password uLimit access to system uAudit trails uScreening and background checks of employees uGood security policies
8
Defending Against Fraud uImmediate checks on legitimate credit/debit cards uPrograms to detect unusual spending uHolograms and photos on cards uMagnetic or digital finger printing uPhysical hardware deterrents
9
Why is the Problem so Big? uMost customers do not want to verify ID uMost merchants don’t check uSecurity vs convenience
10
Sabotage and Information Theft uUnhappy employees uAttacks by competitors uWho else?
11
Nonmalicious Hacking uNo harm is done uService - exposes security weaknesses uHelp create need for tougher security uInformation wants to be free uSome companies are ripping us off
12
Harmless? uTime and effort are involved in tracking down the intruder and shut off means of access uVerifications of no damage uUncertainty that system is preserved uTrespassing is illegal
13
Mechanisms of Protection uPassword protection
14
Internet uMedium for researchers u open access u ease of use u ease of sharing uSecurity depended on trust uAttitudes about security have not caught up with the risk
15
Improving Security uAwareness of extent of problem uEducation of users uAcceptance of responsibility
16
Internet Protection uFirewall
17
Crime Laws uComputer technology challenged existing laws and led to new ones uLarceny uUse of computer time uNew laws uAccess and use of computer without authorization is illegal
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.