Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.

Similar presentations


Presentation on theme: "Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology."— Presentation transcript:

1 Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.

2 How Much Crime? Indetected Unreported Unprosecuted on the rise

3 Who? insiders / former insiders pranksters / hackers spies & thieves organized crime

4 Theft identity information money equipment software piracy intellectual property theft

5 MalWare malicious software. Trojan Horse - Logic / Time Bomb Virus – self replicates Worm – infects a network Spyware – transmits info

6 Dealing with Viruses 18,000+ viruses – 250 in the wild antivirus software networks – help the spread security patches – plug the holes dependence – increase the impact standardization – increase susceptibility

7 Hackers early hackers vs. today. motivation : curiosity challenge illustrate security weaknesses stealing information webjackers & hacktivism denial of service attacks

8 Security protecting computer systems & the information they contain. unwanted access, damage, modification, or destruction. computers do exactly what they are programmed to do : can be reprogrammed, and you must tell them how to protect themselves.

9 Access Restriction something you : –have : key, badge, card –know : password, id code, combination –do : habits, unique to you –are : biometrics used in combination

10 Passwords not using dictionary words mixed case requiring additional symbols requiring frequent changes

11 Encryption translation info to an unreadable form. protect digital data – computers, electronic commerce, wireless systems, Bluetooth devices, bank machines.

12 Firewalls gateway, entry point. lots of different approaches, filter some traffic. only let appropriate packets / traffic through.

13 Audit-control Software leaving & monitoring electronic footprints watch for suspicious behaviour

14 Protecting Against Failure Backups – multiple generations Surge Protector – power surges UPS – uninterrupted power supply Mirroring data / RAID

15 People are Risky don’t see themselves as a risk. work around security.

16 Reliability when we rely on computers, and something goes wrong, the impact can be significant : Therac 25 Y2K – $100 billion cannot find all of the bugs they harder bugs are to find, the worse they are may be. increased complexity compounds the problem.

17 Security vs. Privacy balancing. examples : –e-mail at work –cell phone with GPS –active badge


Download ppt "Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology."

Similar presentations


Ads by Google