Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Ethical Issues of Computer Networks
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
A Gift of Fire Third edition Sara Baase
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
Crime CS4020.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Discovering Computers 2010
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IS 490 Notes for Baase Textbook, Chapter 5. Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Learn how to protect yourself against common attacks
IT Security  .
Social Engineering Charniece Craven COSC 316.
PowerPoint® Slides to Accompany
A Project on CYBER SECURITY
A Gift of Fire Third edition Sara Baase
Tax Identity Theft Presenter Date
Chapter 11 crime and security in the networked economy
Phishing is a form of social engineering that attempts to steal sensitive information.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Internet Safety Vocabulary
PowerPoint® Slides to Accompany
Protecting Your Information Assets
HOW DO I KEEP MY COMPUTER SAFE?
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Protecting Yourself from Fraud including Identity Theft
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime

What We Will Cover Hacking Identity Theft and Credit Card Fraud Scams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web

Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: the joy of programming (early 1960s to 1970s)  It was a positive term  A "hacker" was a creative programmer who wrote elegant or clever code  A “good hack" was an especially clever piece of code  Hackers were Computer Virtuosos

Hacking (cont.) Phase 2: 1970s to mid 1990s  Hacking took on negative connotations  Breaking into computers for which the hacker does not have authorized access  Hacking behavior included pranks, theft, and phone phreaking (manipulating the telephone system)  Still primarily individuals  Includes the spreading of computer worms and viruses and ‘phone phreaking’  Hackers obtained passwords by sophisticated techniques and by using social engineering, fooling people to disclose them.  Companies began using hackers to analyze and improve security

Hacking (cont.) Phase 3: the growth of the Web (beginning with the mid 1990s)  The growth of the Web changed hacking; viruses and worms could be spread rapidly  The kind of accessible information expanded to include credit reports, consumer profiles, medical records, tax records… etc.  Denial-of-service (DoS) attacks used to shut down Web sites(like yahoo,ebay) by the sites with hundreds of thousands of request for requests for Web pages and other information  Large scale theft of personal and financial information  Hackers plant spyware, viruses, and malware (software that performs malicious activity) – password stealing programs

Hacking (cont.) Hackers hats: White hacker hat:it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems Black hat hacker:where it refers to a hacker who breaks into networks or computers, or creates computer viruses Grey hacker hat:sometimes acts illegally, sometimes in good will, and sometimes not

Hacking (cont) Is “harmless hacking” harmless?  Uncertainty about intruder’s intent and activities has additional costs for systems that contain sensitive data.  Uncertainty causes harm, or expense.  Hackers with a good intentions could make a mistake and do significant damage accidentally.  Almost all hacking is a form of trespass

Hacking (cont.) Hacktivism, or Political Hacking: Use of hacking to promote a political cause Some academic writers and political groups argue that hacktivism Is ethical and it is a modern of a form of civil disobedience and how (whether) it should be punished Others argue that the political motive irrelevant or the political hacking is a form of cyberterrorism. Some use the appearance of hacktivism to hide other criminal activities People who agree with apolitical hacking or social position of the hackers will tend to see an act as “ activism” whereas those who disagree will tend to see it as ordinary crime( or worse) How do you determine whether something is hacktivism or simple vandalism?

Hacking (cont.) The Law: Catching and Punishing Hackers: 1986 Congress passed the Computer Fraud and Abuse Act (CFAA)  Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet  The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems  The above Act raised the maximum penalty in the CFAA fro a first offensive from 5 to 10 years.

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): A variety of methods for catching hackers  Law enforcement agents read hacker newsletters and participate in chat rooms undercover  They can often track a handle by looking through newsgroup archives  Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study  Computer forensics is used to retrieve evidence from computers

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Penalties for young hackers  Many young hackers have matured and gone on to productive and responsible careers  Temptation to over or under punish  Sentencing depends on intent and damage done  Most young hackers receive probation, community service, and/or fines  Not until 2000 did a young hacker receive time in juvenile detention

Hacking (cont.) Security  Internet started with open access as a means of sharing information for research  Attitudes about security were slow to catch up with the risks  Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity  Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited

Hacking (cont.) Responsibility for Security  Developers have a responsibility to develop with security as a goal  Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding  Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)

Hacking Discussion Questions Is hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?

Identity Theft and Credit Card Fraud Stealing Identities: Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person  Use credit/debit card numbers, personal information, and social security numbers  year-olds are the most common victims because they use the web most and are unaware of risks  E-commerce has made it easier to steal card numbers and use without having the physical card

Techniques used to steal personal and financial information  Phishing - fishing for personal and financial information disguised as legitimate business (ex :emal from paypal,ebay,amazon) the msg tells he victim to click on a link to what purports to be awebto be a web site of a well-known bank  The phony sites asks fro account numbers,password and other identifying information _Phishing is an example of social engineering, a method used by hackers: the hacker directly asks a person for a sensitive information with some false pretext. _Vishing : voice phishing

Techniques used to steal personal and financial information  Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers  Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft  When people connect to some website, the site plants spyware on their computer.  Hackers hide malicious software in innocent appearing programs that users willingly download (this malware is called Trojan horse)

Identity Theft and Credit Card Fraud (cont.) Stealing Identities (cont.): Techniques used to protect personal and financial information  Activation for new credit cards  Retailers do not print the full card number and expiration date on receipts  Software detects unusual spending activities and will prompt retailers to ask for identifying information  Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger

Identity Theft and Credit Card Fraud (cont.) Responses to Identity Theft: Authentication of and Web sites Various tools can help determine whether the site is safe. s program, Web browsers, search engines can alert users to likely fraud. Use of encryption to securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security  Some financial institutions store a an identification number for the customer’s home computer or laptop and they verify the machine when the customers log on.

Identity Theft and Credit Card Fraud (cont.)  Geographical location tools, like those can tell an online retailer where a customer is.  Credit-card issuers and merchants always make trade-offs between security and convenience. In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information has been stolen Fraud alert is a flag on your credit report that tells the credit office to call you for confirmation when anyone tries to open a new credit account

Identity Theft and Credit Card Fraud (cont.) Biometrics: Biological characteristics unique to an individual They include fingerprints, voice prints, face structure, eye patterns and DNA. No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed

Identity theft Examples The Federal Trade Commission estimates that nearly 10 million Americans had their identities stolen in 2003, costing consumers and businesses more than $50 billion. There is an increasing frequency of websites being hacked and security systems being compromised. Some of the more significant include the hacking into CD Universe’s Website and the stealing of three hundred and fifty thousand (350,000) Credit card numbers. More recently, furniture retailer IKEA’s website was broken into, exposing thousands of customers’ personal identifying information. The IKEA incident was followed several days later by the hacking of Western Union’s website, where the hackers left evidence of having made electronic copies of the credit and debt card information of over fifteen thousand (15,000) customers.

Identity Theft and Credit Card Fraud Discussion Questions What steps can you take to protect yourself from identity theft and credit card fraud? How can you distinguish between an that is a phishing attempt and an from a legitimate business?

Scams and Forgery Three areas of online crime : (1) Auctions: Federal Trade Commission FTC reports that online auction sites are one of the top sources of fraud complaints  Some sellers do not send items or send inferior products  Shill bidding is used to artificially raise prices  Some products are dangerous (drugs)  Some products offered for sale are illegal (unauthorized copy of music and movies )  Sellers give themselves or friends glowing reviews to garner consumer trust

Scams and Forgery Auction sites use various techniques to counter dishonest sellers (Solutions) Customers should be cautious User agreement prohibits shill bidding and offering legal items for sale. eBay requires a credit card number from sellers User can check the reputation of the seller or buyer

Scams and Forgery (cont.) Click fraud –  the Web, advertisers can pay per click  repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget  To technique to control click fraud is to check for and filter out numerous clicks on one ad from the same source. Stock fraud - most common method is to buy a stock low, send out s urging others to buy, and then sell when the price goes up, usually only for a short time

Scams and Forgery (cont.) Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment Defenses against forgery: technical tricks that make copying more difficult All check numbers and amounts are sent to banks to reduce check frauds

Crime Fighting Versus Privacy and Civil Liberties Search and Seizure of Computers: Requires a warrant to search and seize a computer  Court rulings inconclusive about whether information found on computers, but not covered by a warrant, is considered in ‘plain view’ Automated searches  Can monitor constantly and less likely to miss suspicious activity  Can be programmed to only look for what is covered in a warrant

Crime Fighting Versus Privacy The Issue of Venue: Charges are generally filed where the crime occurs Laws differ between states and countries When computer crimes cross state and international borders, what laws apply and where should the trial take place? Where charges are filed may have significant impact if community standards apply The FBI usually files in the state where the crime was discovered and the investigation began

Crime Fighting Versus Privacy Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography, fraud, hacking and other online fraud Treaty sets common standards or ways to resolve international cases It will likely help law enforcement agencies fight some serious cybercrimes but possibly at the cost of reducing protection for civil liberties in free countries

Whose Laws Rule the Web When Digital Actions Cross Borders: Laws vary from country to country Corporations that do business in multiple countries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal Responsibility to prevent access principle: it is responsibility of providers of services and information to make sure their material is not accessible in countries where it is illegal

Whose Laws Rule the Web (Cont.) Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA (Digital Millennium Copyright Act) when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia

Whose Laws Rule the Web (Cont.) Some areas where national laws differ: - Intellectual property - Gambling - Hacking/viruses - Privacy - spam

Whose Laws Rule the Web (Cont.) Libel, Speech and Commercial Law: Even if something is illegal in both countries, the exact law and associated penalties may vary Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may require numerous trips Freedom of speech suffers if businesses follow laws of the most restrictive countries

Potential Solutions International agreements can set common standards or means of resolving international cases among the countries that sign them Alternative solution Authority to prevent entry: the government of Country A can act within Country A to try to block the entrance of material that is illegal there, but may not apply its laws to the people who create and publish the material, or provide a service, in Country B if it is legal there

Whose Laws Rule the Web Discussion Questions What suggestions do you have for resolving the issues created by differences in laws between different countries? What do you think would work, and what do you think would not?