Computer Crimes Chapter 9
Definition Illegal act that involves a computer system or computer-related system Telephone, microwave, satellite telecommunications system That connect one or more computers or computer- related systems
Three Categories Natural or inadvertent attack Human blunders, errors and omissions Intentional trheats
Two Aspects of Cyber Crime Virus Hacking
Two Types of Attacks Penetration Insider threats Hackers Criminal Groups Hactivism Denial of Service Attacks Inside Outside
Motivation of Attacks Business and Industrial Espionage Joke/Hoax Political Activism Political and Military Espionage Terrorism/Extortion Vendetta
Questions Are we prepared for a cyber attack? What are the consequences?
Congressional Hearing Intelligence and Security in Cyberspace Comparison make of the efforts of the government to a “toddler soccer game were everyone just runs around trying to kick the ball somewhere
Reasons for No Information Lack of reporting requirements Public sector – fear of market reaction to news Lack of enforcement of existing reporting mechanisms Detection of insider attacks Lack of security agencies or trained security agencies
Reason for Growth in Cyber Crimes Rapid technology growth Easy availability of hacker tools Anonymity Cut-and-past programming technology Communication speed High degree of internetworking Increasing dependency on computers
How Much Does It Cost? Who Knows? Difficult to quantify the number of attacks No baseline Not reporting insider attacks Lack of cooperation between emergency and computer crime reporting centers Continued
How Much Does It Cost? Who Knows? Unpredictable types of attacks Virus mutation Not enough trained system administrators Primitive monitoring technology
Social and Ethical Consequences Psychological effects – hate and bigotry Acceptance of the norm and resulting moral decay Loss of privacy Trust Others?