Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.

Similar presentations


Presentation on theme: "Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer."— Presentation transcript:

1 Chapter 16 Computer Crime

2 Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer crimes are committed by “insiders.” Most computer crimes are not prosecuted.

3 Computer Crimes Include Internet auction fraud Stalkers Harassing e-mails Theft of trade secrets Internet bookmaking Virus infection Computer sabotage Child pornography Cell phone cloning Illegal satellite TV Money laundering Electric Eavesdropping And much more…

4 FBI Definition of Computer Crime Computer Crime: that which involves the addition, deletion, change or theft of information.

5 Terminology Boot Browser Byte Cyber Cop Cyber Crime Cyber punk Cyber Space Disk Drive DOS Download E-mail Floppy Disk Gigabyte Hacker Hard Disk Hardward

6 Terminology Cont. Hardware Disabler Imaging Internet protocol address Kilobyte Logic Bomb Megabyte Modem Network PC Piracy Program Scanner Script Software Trashing Trojan Horse

7 Terminology Cont. Upload Virtual reality Virus (computer)

8 Viruses A computer virus is a program created to infect other programs with copies of itself. A virus is a computer program that attaches itself to the first string of code in a host program, and replaces it. The virus then executes instructions to replicate before the program actually runs. These instructions cause damage to the software or hardware system.

9 Motivations for Computer Crime Ignorance of proper professional conduct Misguided playfulness Personal gain Maliciousness or revenge

10 Suggestions for Handling Computers at Crime Scene Make sure you have adequate language in your warrant to deal with any computers you may encounter. Take pictures of the screen and the computer in its setting. Disconnect the computer from any modem cables on the wall.

11 Suggestions for Handling Computers at Crime Scene Disconnect computer from power source. Secure the computer for transport. Search for any printouts, manuals, note, passwords, etc. Use printouts and pictures to conduct your interviews.

12


Download ppt "Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer."

Similar presentations


Ads by Google