A Gift of Fire Third edition Sara Baase

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

Computer Crimes and Security Professor Matt Thatcher.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
A Gift of Fire Third edition Sara Baase
Using Your Knowledge – Security Threats
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Crime CS4020.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
A Gift of Fire Third edition Sara Baase
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IS 490 Notes for Baase Textbook, Chapter 5. Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Securing Information Systems
Securing Information Systems
Malware and Computer Maintenance
GCSE ICT SECURITY THREATS.
PowerPoint® Slides to Accompany
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Societal Issues in Computing (COMP466)
A Gift of Fire Third edition Sara Baase
Forensic and Investigative Accounting
Computers: Tools for an Information Age
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Introduction to Cybercrime and Security
Networking for Home and Small Businesses – Chapter 8
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CYBERSAFETY & Personal information
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Laws Against Computer Hacking
Presentation transcript:

A Gift of Fire Third edition Sara Baase Chapter 5: Crime 2018/11/22 Slides prepared by Cyndi Chie and Sarah Frye

What We Will Cover Hacking 2018/11/22

Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s It was a positive term A "hacker" was a creative programmer who wrote elegant or clever code A "hack" was an especially clever piece of code 2018/11/22

Hacking (cont.) Phase 2: 1970s to mid 1990s Hacking took on negative connotations Breaking into computers for which the hacker does not have authorized access Still primarily individuals Includes the spreading of computer worms and viruses and ‘phone phreaking’ Companies began using hackers to analyze and improve security 2018/11/22

Hacking (cont.) Phase 3: beginning with the mid 1990s The growth of the Web changed hacking; viruses and worms could be spread rapidly Political hacking (Hacktivism) surfaced Use of hacking to promote a political cause Denial-of-service (DoS) attacks used to shut down Web sites Large scale theft of personal and financial information 2018/11/22

Hacking (cont.) The Law: Catching and Punishing Hackers: 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems 2018/11/22

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): A variety of methods for catching hackers Law enforcement agents read hacker newsletters and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers 2018/11/22

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Penalties for young hackers Many young hackers have matured and gone on to productive and responsible careers Temptation to over or under punish Sentencing depends on intent and damage done Most young hackers receive probation, community service, and/or fines Not until 2000 did a young hacker receive time in juvenile detention 2018/11/22

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Security Internet started with open access as a means of sharing information for research Attitudes about security were slow to catch up with the risks Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited 2018/11/22

Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Responsibility for Security Developers have a responsibility to develop with security as a goal Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware) 2018/11/22

Hacking Discussion Questions Is hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why? 2018/11/22