Presentation on theme: "Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams."— Presentation transcript:
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams
What is Computer Crime? Using computer technology to maliciously affect others What’s At Risk: - Intellectual Property - Personal Information - Organizational Information - National and Global Security
Techniques Scavenging: for stray data or garbage for clues that might unlock the secrets of a system Zapping: which means penetrating a computer by unlocking the master key to its program and then destroying it by activating its own emergency program Worms or worm programs: entail the deletion of portions of a computer's memory, thus creating a hole of missing information Time bombs or Logic bombs: which involve the insertion of routines that can be triggered later by the computer's clock or a combination of events. When the bomb goes off, the entire system, perhaps worth millions, will crash Viruses: are self-replicating programs which can have a similar effect to Time or Logic bombs
Forms Of Computer Crime Theft of Money -The transfer of payments to the wrong accounts Theft of Personal Information: - Stealing ones information through use of computer technology Theft of Goods - By their diversion to the wrong destination Theft of Computer Time: - Use of an employers computer resources for personal work
Who are the criminals?
What is Identity Theft? The criminal act of using stolen information about a person to assume that person’s identity
History Through the creation of online databases, businesses, and online networks, in the past 20 years, it has become easier to commit identity theft through the use of computer crimes.
Ways to Commit Identity Theft Computer as a Tool: Hacking into databases: - Social Security Numbers - Credit Card Information - License Information
Ways to Commit Identity Theft Computer as an Object: Internet Fraud: - Applying for Credit Cards - Buying goods - Money Transfers
Ways to Prevent Identity Theft Computer Protection - Passwords - Firewalls - Data Encryption Personal Protection - Keep a watchful eye on bank accounts and credit statements
I am a Victim, What Should I do? Close the accounts you know or you think may have been compromised File a report with the state or local police File a complaint with the FTC