A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

IS 376 Security in Cyberspace November 18,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
A Gift of Fire Third edition Sara Baase
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
A Gift of Fire, 2edChapter 7: Computer Crime1 Social, Legal, and Ethical Issues for Computers and the Internet By: Ramon Hernandez Eugene Flock Zhonghui.
Chapter 1 Introduction to Security
Crime CS4020.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Chapter 11 Security and Privacy: Computers and the Internet.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Unethical use of Computers and Networks
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Computer Security By Duncan Hall.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Add video notes to lecture
IT Security  .
PowerPoint® Slides to Accompany
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
Who Uses Encryption? Module 7 Section 3.
PowerPoint® Slides to Accompany
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Forensic and Investigative Accounting
INFORMATION SYSTEMS SECURITY and CONTROL
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
Lesson 2- Protecting Yourself Online
Laws Against Computer Hacking
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information Theft, and Forgery Crime Fighting Versus Privacy and Civil Liberties

A Gift of Fire, 2edChapter 7: Computer Crime2 Introduction Computers Are Tools Computers assist us in our work, expand our thinking, and provide entertainment. Computers Are Used to Commit Crimes Preventing, detecting, and prosecuting computer crime is a challenge.

A Gift of Fire, 2edChapter 7: Computer Crime3 Hacking The Phases of Hacking Phase One: The early years 1960s and 1970s. Originally, hacker referred to a creative programmer wrote clever code. The first operating systems and computer games were written by hackers. The term hacking was a positive term. Hackers were usually high-school and college students. Q : Describe a modern-day version of “clever” hacks.

A Gift of Fire, 2edChapter 7: Computer Crime4 Hacking The Phases of Hacking (cont’d) Phase Two: Hacking takes on a more negative meaning. 1970s through 1990s. Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. Early computer crimes were launched against business and government computers. Adult criminals began using computers to commit their crimes. Q : Distinguish between the hacking done by Kevin Mitnick and Robert J. Morris.

A Gift of Fire, 2edChapter 7: Computer Crime5 Hacking The Phases of Hacking Phase Three: The Web Era Beginning in the mid-1990s. The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. Crimes include the release of malicious code (viruses and worms). Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. Hackers with minimal computer skills can create havoc by using malicious code written by others. Q : Why are denial-of-service attacks difficult to prevent?

A Gift of Fire, 2edChapter 7: Computer Crime6 Hacking Hactivism …is the use of hacking expertise to promote a political cause. This kind of hacking can range from mild to destructive activities. Some consider hactivism as modern-age civil disobedience. Others believe hactivism denies others their freedom of speech and violates property rights. Q : Argue the case that hactivism is ethical.

A Gift of Fire, 2edChapter 7: Computer Crime7 Hacking The Law Computer Fraud and Abuse Act (CFAA, 1986) It is a crime to access, alter, damage, or destroy information on a computer without authorization. Computers protected under this law include: –government computers, –financial systems, –medical systems, –interstate commerce, and –any computer on the Internet. Q : Is your personal computer protected under this law?

A Gift of Fire, 2edChapter 7: Computer Crime8 Hacking The Law (cont’d) USA Patriot Act (USAPA, 2001) Amends the CFAA. Allows for recovery of losses due to responding to a hacker attack, assessing damages, and restoring systems. Higher penalties can be levied against anyone hacking into computers belonging to criminal justice system or the military. The government can monitor online activity without a court order. Q : Are anti-hacking laws adequate?

A Gift of Fire, 2edChapter 7: Computer Crime9 Hacking Catching Hackers … requires law enforcement to recognize and respond to myriad hacking attacks. Computer forensics tools may include: Undercover agents, Honey pots (sting operations in cyberspace), Archives of online message boards, Tools for recovering deleted or coded information. Computer forensics agencies and services include: Computer Emergency Response Team (CERT), National Infrastructure Protection Center (NIPC), Private companies specializing in recovering deleted files and , tracking hackers via Web site and telephone logs, etc.. Q : What computer forensics tools or agencies have been in the news lately?

A Gift of Fire, 2edChapter 7: Computer Crime10 Hacking Questions About Penalties Intent Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Age Should underage hackers receive a different penalty than adult hackers? Damage Done Should the penalty correspond to the actual damage done or the potential for damage?

A Gift of Fire, 2edChapter 7: Computer Crime11 Hacking Security Security weaknesses can be found in the computer systems used by: businesses, government (classified and unclassified), and personal computers. Causes of security weakness: characteristics of the Internet and Web, human nature, inherent complexity of computer systems. Q : How secure is your computer at home? At work?

A Gift of Fire, 2edChapter 7: Computer Crime12 Hacking Security can be improved by: Ongoing education and training to recognize the risks. Better system design. Use of security tools and systems. Challenging “others” to find flaws in systems. Writing and enforcing laws that don’t stymie research and advancement. Q : Does weak security justify intrusion?

A Gift of Fire, 2edChapter 7: Computer Crime13 Online Scams Auctions Selling and buying goods online has become popular. Problems: sellers don’t send the goods, sellers send inferior goods, price is driven up by shill bidding, and illegal goods sold. Solutions: educate customers, read seller “reviews,” use third-party escrow, and more…

A Gift of Fire, 2edChapter 7: Computer Crime14 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Some Causes of Fraud Credit-Card Stolen receipts, mailed notices, and cards. Interception of online transaction or weak e-commerce security. Careless handling by card-owner. ATM Stolen account numbers and PINs. Insider knowledge. A counterfeit ATM. Telecommunications Stolen long-distance PINs. Cloned phones. Q : What is the legal definition of fraud? Embezzlement? Sabotage? Theft?

A Gift of Fire, 2edChapter 7: Computer Crime15 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Some Defenses Against Fraud Credit-Card Instant credit-card check. Analysis of buying patterns. Analysis of credit card applications (to detect identity theft). Verify user with Caller ID. ATM Redesigned ATMs. Limited withdrawal. Telecommunications match phone “signature” with serial number. identify phone without broadcasting serial number. Q : Identify a business’ defense against fraud that you have witnessed.

A Gift of Fire, 2edChapter 7: Computer Crime16 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Embezzlement and Sabotage Some Causes Insider information. Poor security. Complex financial transactions. Anonymity of computer users. Some Defenses Rotate employee responsibility. Require use of employee ID and password. Implement audit trails. Careful screening and background checks of employees.

A Gift of Fire, 2edChapter 7: Computer Crime17 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Identity Theft Some Causes of Identity Theft Insecure and inappropriate use of Social Security numbers. Careless handling of personally identifiable information. Weak security of stored records. Insufficient assistance to identity theft victims. Some Defenses for Identity Theft Limit use of personally identifiable information. Increase security of information stored by businesses and government agencies. Improve methods to accurately identify a person. Educate consumers. Q : What measures do you take to reduce the risk of theft of your identity?

A Gift of Fire, 2edChapter 7: Computer Crime18 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Forgery Some Causes Powerful computers and digital manipulation software. High-quality printers, copiers, and scanners. Some Defenses Educate consumers and employees. Use anti-counterfeiting techniques during production. Use counterfeit detection methods. Create legal and procedural incentives to improve security. Q : How would you educate your peers about the risks of digital forgery? A parent? A child?

A Gift of Fire, 2edChapter 7: Computer Crime19 Crime Fighting vs Privacy and Civil Liberties Scams Crime Fighting Automated surveillance software to look for suspicious Web activity. Privacy and Civil Liberties No search warrant nor proof of probable cause. Biometrics Crime Fighting Exact match of biological characteristics to a unique person. Privacy and Civil Liberties Easy to build complete dossier on people. Q : How much of your privacy and civil liberties are you willing to give up in order to allow law enforcement to better fight computer crime?

A Gift of Fire, 2edChapter 7: Computer Crime20 Crime Fighting vs Privacy and Civil Liberties Search and Seizure of Computers Crime Fighting Obtain evidence of a crime. Privacy and Civil Liberties Day-to-day business ceases; non-criminal contact with others ends. The Cybercrime Treaty Crime Fighting U.S. and European governments agree to cooperate with investigations. Privacy and Civil Liberties Potential for government spying is great. Q : Might there be incriminating data stored about you in the logs of your ISP?