Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.

Similar presentations


Presentation on theme: "Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and."— Presentation transcript:

1 Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and Information Hiding

2 Computer crime Different concepts appeared, for example: Hacking Hacking Fraud خداع Fraud خداع Embezzlement اختلاس Embezzlement اختلاس Sabotage التخريب Sabotage التخريب Identity Theft Identity Theft Forgery التزييف Forgery التزييف Denial of Service Denial of Service Viruses Viruses Piracy of copyrighted materials Piracy of copyrighted materials

3 What is a computer crime? Some people believe that there is nothing special about crimes that involve computers, and there is no need to have the concept “ Computer crime ”. What do you think? Some people believe that there is nothing special about crimes that involve computers, and there is no need to have the concept “ Computer crime ”. What do you think? There have been times that it was thought any crime involving a computer was a computer crime There have been times that it was thought any crime involving a computer was a computer crime Is a murder involving the use of a scalpel automatically an issue in medical ethics just because a medical instrument was used? Is a murder involving the use of a scalpel automatically an issue in medical ethics just because a medical instrument was used?

4 What is a computer crime? Computer crime is : “ a criminal act that can be carried out only through the use of computer technology ” Computer crime is : “ a criminal act that can be carried out only through the use of computer technology ” With this, the theft of a computer hardware device (printer), theft of an automobile full of microprocessors would not be a computer crime b/c the computer is not the principal tool for carrying out the crime With this, the theft of a computer hardware device (printer), theft of an automobile full of microprocessors would not be a computer crime b/c the computer is not the principal tool for carrying out the crime Similarly, breaking into the computer lab, vandalizing a computer system in the lab, these three examples are not computer crimes using this definition Similarly, breaking into the computer lab, vandalizing a computer system in the lab, these three examples are not computer crimes using this definition

5 Quick History of Computer Crimes Phase One: The early years Phase One: The early years 1960s and 1970s. 1960s and 1970s. Originally, hacker referred to a creative programmer wrote clever code. Originally, hacker referred to a creative programmer wrote clever code. The first operating systems and computer games were written by hackers. The first operating systems and computer games were written by hackers. The term hacking was a positive term. The term hacking was a positive term. Hackers were usually high-school and college students. Hackers were usually high-school and college students.

6 Quick History of Computer Crimes Phase Two: Hacking takes on a more negative meaning. Phase Two: Hacking takes on a more negative meaning. 1970s through 1990s. 1970s through 1990s. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Early computer crimes were launched against business and government computers. Early computer crimes were launched against business and government computers.

7 Quick History of Computer Crimes Phase Three: The Web Era Phase Three: The Web Era Beginning in the mid-1990s. Beginning in the mid-1990s. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. Crimes include the release of malicious code (viruses and worms). Crimes include the release of malicious code (viruses and worms). Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Hackers with minimal computer skills can create a lot of damage by using malicious code written by others. Hackers with minimal computer skills can create a lot of damage by using malicious code written by others.

8 Hactivism: Hactivism is the use of hacking expertise to promote a political cause. Hactivism is the use of hacking expertise to promote a political cause. This kind of hacking can range from mild to destructive activities. This kind of hacking can range from mild to destructive activities. Some consider hactivism as modern-age civil disobedience. Some consider hactivism as modern-age civil disobedience. Others believe hactivism denies others their freedom of speech and violates property rights. Others believe hactivism denies others their freedom of speech and violates property rights. Do you think that hactivism is ethical? Do you think that hactivism is ethical?

9 Today: Far fewer individuals and organizations are sympathetic to the causes of computer hackers Far fewer individuals and organizations are sympathetic to the causes of computer hackers Why? Possibly the growing dependence of citizens on the Internet Why? Possibly the growing dependence of citizens on the Internet A growing concern that cyberspace must become more secure and that hacking should not be tolerated A growing concern that cyberspace must become more secure and that hacking should not be tolerated

10 Questions About Penalties Intent Intent Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Age Age Should underage hackers receive a different penalty than adult hackers? Should underage hackers receive a different penalty than adult hackers? Damage Done Damage Done Should the penalty correspond to the actual damage done or the potential for damage? Should the penalty correspond to the actual damage done or the potential for damage?

11 Security can be improved by: Ongoing education and training to recognize the risks. Ongoing education and training to recognize the risks. Better system design. Better system design. Use of security tools and systems. Use of security tools and systems. Challenging “ others ” to find flaws in systems. Challenging “ others ” to find flaws in systems. Writing and enforcing laws that don ’ t impede research and advancement. Writing and enforcing laws that don ’ t impede research and advancement.


Download ppt "Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and."

Similar presentations


Ads by Google