Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Cyber Crime and Technology
Jacky Altal. T O C  Hackers Terminology  Cyber attacks in 2012 (so far…)  Nations Conflict  Cyber Motives  Characteristics of CyberCrime  DEMO –
Ethical and Social...J.M.Kizza 1 Module 9: Computer Crimes Introduction History of Computer Crimes Computer Systems Attacks Motives Costs and Social Consequences.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
Information Warfare Theory of Information Warfare
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 An Overview of Computer Security computer security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CYBER CRIME AND SECURITY TRENDS
1J. M. Kizza - Ethical And Social Issues Module 13: Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems Introduction Introduction.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Computer Crime and CyberCrime Why we need Computer Forensics.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
HOMMER: Holistic Model for Minority Education & Research “The Balancing Act”: Accountability vs. Privacy by Deidre W. Evans Christy L. Chatmon Department.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Information Warfare Playgrounds to Battlegrounds.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Cyber Security Nevada Businesses Overview June, 2014.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Chapter 9 Enhancing Information/Computer Security.
Chisinau 2004NATO ANW1 Security Issues for e-Society Oliver B. Popov MSU, SU, SCMU NATO ANW The Third CEENet Workshop on Managerial Issues - MIXREN Chisinau,
IS Network and Telecommunications Risks Chapter Six.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Information Warfare Playgrounds to Battlegrounds.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Ethical and Social...J.M.Kizza1 Module 9: Ethical and Social Issues in Cyberspace  Cyberspace Access  Intellectual Property Rights  Cyberspace Censorship.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Cyber crime and security issues
Computer Security Incidents
Career JEOPARDY! Cluster: Information Technology
Business Threats What could it mean for you?
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cyber Crimes Chunlian QU 9/18/2018.
CSI Survey 2007 Tiffany Gorman
Andy Hall – Cyber & Tech INSURANCE Specialist
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Chapter 21:Security Beyond Computer Networks: Information Assurance
Computer Security Incidents
MIS650 Introduction.
Presentation transcript:

Computer Crimes Chapter 9

Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications system  That connect one or more computers or computer- related systems

Three Categories  Natural or inadvertent attack  Human blunders, errors and omissions  Intentional trheats

Two Aspects of Cyber Crime  Virus  Hacking

Two Types of Attacks  Penetration  Insider threats  Hackers  Criminal Groups  Hactivism  Denial of Service Attacks  Inside  Outside

Motivation of Attacks  Business and Industrial Espionage  Joke/Hoax  Political Activism  Political and Military Espionage  Terrorism/Extortion  Vendetta

Questions Are we prepared for a cyber attack? What are the consequences?

Congressional Hearing Intelligence and Security in Cyberspace Comparison make of the efforts of the government to a “toddler soccer game were everyone just runs around trying to kick the ball somewhere

Reasons for No Information  Lack of reporting requirements  Public sector – fear of market reaction to news  Lack of enforcement of existing reporting mechanisms  Detection of insider attacks  Lack of security agencies or trained security agencies

Reason for Growth in Cyber Crimes  Rapid technology growth  Easy availability of hacker tools  Anonymity  Cut-and-past programming technology  Communication speed  High degree of internetworking  Increasing dependency on computers

How Much Does It Cost? Who Knows?  Difficult to quantify the number of attacks  No baseline  Not reporting insider attacks  Lack of cooperation between emergency and computer crime reporting centers Continued

How Much Does It Cost? Who Knows?  Unpredictable types of attacks  Virus mutation  Not enough trained system administrators  Primitive monitoring technology

Social and Ethical Consequences  Psychological effects – hate and bigotry  Acceptance of the norm and resulting moral decay  Loss of privacy  Trust  Others?