Download presentation
Presentation is loading. Please wait.
Published byJane Stella Rich Modified over 8 years ago
1
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents is increasing dramatically Computer crime is now global
2
2 The Computer as a Tool to Commit Crime Criminals need two capabilities to commit most computer crimes –Knowing how to gain access to the computer system –Knowing how to manipulate the system to produce the desired result
3
3 Cyberterrorism Cyberterrorist –Someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate –Serves as governmental focal point for fighting cyberterrorism
4
4 Identity Theft Imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else –Information is then used to obtain credit, merchandise, and/or services in the name of the victim or to provide the thief with false credentials Identity Theft and Assumption Deterrence Act of 1998 passed to fight identity theft 9 million victims in 2005
5
5 Illegal Access and Use Hacker: learns about and uses computer systems Criminal hacker (also called a cracker): gains unauthorized use or illegal access to computer systems Script bunnies: automate the job of crackers Insider: employee who compromises corporate systems Malware: software programs that destroy or damage processing
6
6 Illegal Access and Use (continued) Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission Worm: parasitic computer program that can create copies of itself on the infected computer or send copies to other computers via a network
7
7 Illegal Access and Use (continued) Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect Logic bomb: type of Trojan horse that executes when specific conditions occur –Triggers for logic bombs can include a change in a file by a particular series of keystrokes or at a specific time or date
8
8 Illegal Access and Use (continued) Tips for avoiding viruses and worms –Install antivirus software on your computer and configure it to scan all downloads, e-mail, and disks –Update your antivirus software regularly –Back up your files regularly –Do not open any files attached to an e-mail from an unknown, suspicious, or untrustworthy source
9
9 Illegal Access and Use (continued) Tips for avoiding viruses and worms (continued): –Do not open any files attached to an e-mail unless you know what it is, even if it appears to come from a friend or someone you know –Exercise caution when downloading files from the Internet Ensure that the source is legitimate and reputable
10
10 Computer-Related Scams Examples of Internet scams –Get-rich-quick schemes involving bogus real estate deals –“Free” vacations with huge hidden costs –Bank fraud –Fake telephone lotteries Phishing –Gaining access to personal information by redirecting user to fake site
11
11 Ethical Issues in Information Systems Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behavior
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.