The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
First Look at Security and Privacy Jeremiah Burleson.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Using Information Technology
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Technical Implementation: Security Risks
Securing Information Systems
IT Security  .
Authentication.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
BCT 2.00 Analyze Technology Issues
Computer Security.
Presentation transcript:

The Internet Crime Kathi Subramaniyam CS-403

Overview Internet crime Types of Crime Security features Future

Internet crime Today’s world of computer crime,”Hacker”is a well known word. Hackers are people who try to get access to computer system illegally,usually from a personal computer,via a data communication network. Some hackers invade websites with taunting boasts and their own private jokes and victims feel violated.

Types of crime The trojan horse: refers to illegal instructions placed in the middle of a legitimate program. Zapping: able to bypass any security system. Bomb: A bomb causes a program to trigger damage under certain conditions.

Types of crime continued Data diddling: Which means changing data before or as it enter the system. Piggy backing: When an illicit user “rides” into the system on the back of another user.

Types of crime continued Salami:Refers to small slices of money that may be subtracted from large financial system undetected. Scavenging: The scavengers search the trash cans and dumpsters for printouts that contain information about credit card numbers account number.

Security Features Forensics: Computer forensic means the uncovering of computer stored information suitable for use in illegal procedures.Forensic experts work on tracing missing inventory or a court ordered subpoena for messages containing sexual harassment language

Security Features continued Security of software data and personal computers. Safeguarding the system against such threats as natural disaster, fire, accident, vandalism, theft, destruction of data and hackers. A person should have something recognizable to the computer and which will give him or her access to the computer room or locked terminal.(badge, plastic card, key, token) Now software can verify both scanned and online signatures.

Security Features continued Bio-metric security systems are coming on. The science measures an individual’s body characteristics, when you simply insert your finger into an identification machine. Some systems use the characteristics of the entire hand. Another way is the identification of the voice pattern or sometimes the identification is based on the retina of the eye which is harder to duplicate than a voice pattern.

The Future Employee damage will increase as the computer literacy increases. Financial crimes will increase. The virus will bring down the internet without any warning, unless any changes in the anti virus protection is made. Worse viruses can be expected. The use of unix is not enough to secure the internet, We need to have stronger authentication and end to end encryption.

The Future continued People will begin to feel that internet is not reliable. Criminals will continue to grow and smart criminals will remain hidden. The future of challenging automated crimes wold be packaged in a single computer program we have to use high level automated security.