Download presentation
Presentation is loading. Please wait.
1
Computer Crime Team Tuna: Kevin Chu Kendric Evans Alice Nailis
2
Introduction Nearly nine out of ten businesses the FBI surveyed reported some sort of security incidents--mostly viruses and spyware, which accounted for $12 million of the total losses.“ Virginia Citrano—Forbes.com Virginia Citrano—Forbes.com
3
Important Terms Nerdy: Nerdy: Denial of Service: Using a piece of malicious software that overloads your system or, more commonly, an internet resource such that it cannot respond to normal activites. Denial of Service: Using a piece of malicious software that overloads your system or, more commonly, an internet resource such that it cannot respond to normal activites. Warez: Copyrighted material, usually software, that has been traded illegally on the internet. Warez: Copyrighted material, usually software, that has been traded illegally on the internet.
4
Important Terms Not so Nerdy: Not so Nerdy: Fraud: Essentially lying for gain. Technically it refers to the crime of deliberately deceiving someone in order to damage them Fraud: Essentially lying for gain. Technically it refers to the crime of deliberately deceiving someone in order to damage them Extortion: Intimidating or threatening someone for money or property Extortion: Intimidating or threatening someone for money or property
5
What exactly is Computer Crime? Computer Crime is many things: Computer Crime is many things: Fraud: Internet fraud can be anything from credit card theft to Email address harvestingFraud: Internet fraud can be anything from credit card theft to Email address harvesting Harassment: Writing untrue things in blogs, insulting people in chat rooms/forums, spamHarassment: Writing untrue things in blogs, insulting people in chat rooms/forums, spam Drug trafficking: The internet is being used more and more for the selling and distribution of drugs.Drug trafficking: The internet is being used more and more for the selling and distribution of drugs. Cyber-terrorism: Even terrorism has spread to the net with communications and attempts at infiltrating Government websitesCyber-terrorism: Even terrorism has spread to the net with communications and attempts at infiltrating Government websites
6
WoW Hack Late March, a security flaw was uncovered that allowed hackers to steal World of Warcraft account information. Late March, a security flaw was uncovered that allowed hackers to steal World of Warcraft account information. According to the BBC article, one of these accounts is worth almost twice as much as stolen credit card info According to the BBC article, one of these accounts is worth almost twice as much as stolen credit card info
7
Windows Vista – Virus Way back in August ’05 Way back in August ’05 Austrian hacker “Second Part to Hell” discovered some security flaws in a Vista betaAustrian hacker “Second Part to Hell” discovered some security flaws in a Vista beta Released proof-of-concept code showing how easy it would be to exploit the Vista shell (called Monad)Released proof-of-concept code showing how easy it would be to exploit the Vista shell (called Monad) Named this virus family “Danom”Named this virus family “Danom” So far, no real viruses have been madeSo far, no real viruses have been made
8
Good, Old Fashioned Theft December, 2004 December, 2004 Several computers were stolen from the University of DelawareSeveral computers were stolen from the University of Delaware ~340 student records were on those computers~340 student records were on those computers Hard to protect against someone just walking off with a computer or threeHard to protect against someone just walking off with a computer or three
9
Final Quote Security is, I would say, our top priority because for all the exciting things you will be able to do with computers - organizing your lives, staying in touch with people, being creative - if we don't solve these security problems, then people will hold back.Security is, I would say, our top priority because for all the exciting things you will be able to do with computers - organizing your lives, staying in touch with people, being creative - if we don't solve these security problems, then people will hold back. Bill Gates Bill Gates The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards. Gene Spafford Gene Spafford
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.