Download presentation
Presentation is loading. Please wait.
Published bySara Summers Modified over 9 years ago
1
CS 4001Mary Jean Harrold1 Class 25 Computer crime Assign Term paper—due 11/20
2
CS 4001Mary Jean Harrold2 Computer Crime
3
CS 4001Mary Jean Harrold3 Why Worry About Computer Crime? Crimes committed using computer or Internet can be more costly (monetarily) than other crimes e.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) estimates are that computer crime costs victims in the USA at least $5×10 8 /year, and true value of such crime might be substantially higher Computer crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Computer crimes are harder to detect and trace (e.g., the anonymity of the Web) Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet.
4
CS 4001Mary Jean Harrold4 Why Worry About Computer Crime? What are some examples of computer crime of which you are aware?
5
CS 4001Mary Jean Harrold5 Hacking Discussion Use of the word “hacker” What did the word “hacker” mean in the early days of computing (1960-70)? How did the use of “hacker” change after 1970? Justification of “hacking” How do hackers justify their activities? What are counterarguments to their justifications? What are some techniques used to catch hackers? Give examples (real and recent) of a computer crime committed by insiders (employees) in a company? What are some problems with electronic voting?
6
CS 4001Mary Jean Harrold6 Hacking 1960-1970 Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Sometimes these folks would break into the computer systems at their schools to experiment and have fun; remember that until the PC and the Internet, computing resources were quite restricted.
7
CS 4001Mary Jean Harrold7 Hacking (cont’d) 1970-1995 The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). There were also crimes, such as thefts of information and “phone hacking.” The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in 1995. He caused several million dollars of damage.
8
CS 4001Mary Jean Harrold8 Hacking (cont’d) After 1995--the Web era Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectedness of the Web. Every networked computer is potentially vulnerable—e.g.,basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.). Now we have viruses transmitted via email that spread in a similar fashion to real diseases (but much faster); there often have to be quarantine procedures. -The “Love Bug” from 2000 cost an estimated $10 billion in damage. -Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable.
9
CS 4001Mary Jean Harrold9 Hacking Discussion (cont’d) Do you agree or disagree with the following statement by Ken Thompson (for what is he known?) The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked. Write a paragraph or two. Give reasons.
10
CS 4001Mary Jean Harrold10 Hacking Discussion (cont’d) Consider the following question: Do hackers do public service by finding and publicizing computer security weaknesses? Select a side and write a few because clauses.
11
CS 4001Mary Jean Harrold11 On-line Voting Suppose you are on a consulting team to design a voting system for your state in which people will vote by logging on to a Web site. What are some important design considerations? What are some pros and cons for such a system? Overall, is it a good idea?
12
CS 4001Mary Jean Harrold12 Computer Viruses More than 85,000 virus-type threats exist today. Complicated because there are many virus hoaxes, which may be in the form of dire email warnings about disk-eating (or computer destroying!) attachments that may land in your inbox. See www.sophos.com/virusinfo/ or www.ciac.org/ciac/ciac_virus_info.htmlwww.sophos.com/virusinfo/ www.ciac.org/ciac/ciac_virus_info.html Internet hoaxes—see http://hoaxbusters.ciac.org/http://hoaxbusters.ciac.org/
13
CS 4001Mary Jean Harrold13 Types of Viruses Malicious worms (e.g., the Love Bug) that propagate using email and destroy the contents of computers. Denial-of-service attacks; more recently there are distributed DNS attacks. “Back-door” worms that exploit vulnerabilities to enter surreptitiously and copy private information.
14
CS 4001Mary Jean Harrold14 Class discussion for Thursday 3-minute presentations by each group 1.Handout describes situation 2.Favor of criminal action; defense against criminal action Everyone not on that issue votes for or against the person 1.Student in a course...not responsible 2.Student who activated…responsible 3.President of college…not responsible 4.President of college’s ISP… 5.Director of hospital… Discuss
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.