Computer Crime Computer and Network Security. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Identity Theft.

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Chapter 6 Computer and Network Security. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview Introduction.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
The History of Hacking By: Monica Flores.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Prepared by: Nahed Al-Salah
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Forth.
Computers in Society Week 8: Computer Security and Hacking.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Third.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Chapter 6: Computer and Network Security Ethics for the Information Age Fourth Edition by Michael J. Quinn Copyright © 2011 Pearson Education,
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
Introduction of Internet security Sui Wang IS300.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Computer crimes.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Technical Implementation: Security Risks
Add video notes to lecture
Chapter 6: Computer and Network Security
IT Security  .
Fundamentals of Information Systems
BCT 2.00 Analyze Technology Issues
Chapter 6: Computer and Network Security
Presentation transcript:

Computer Crime Computer and Network Security

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Identity Theft Background History and role of the Social Security Number Debate over a national ID Card REAL ID Act

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 3 Background Identity theft: misuse of another person’s identity to take actions permitted the owner Credit card fraud #1 type of identity theft Ease of opening accounts contributes to problem 10 million victims in 2004 alone Average loss: $5,000

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 4 Gaining Access to Information Mailboxes Lost or stolen wallets Dumpster diving Shoulder surfing Skimmers (wedges) Phishing

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 5 History, Role of Social Security Number Social Security cards first issued 1936 Originally used only for SS purposes Use of SSN has gradually increased SSN is a poor identification number Not unique Rarely checked No error-detecting capability

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 6 Arguments for a National ID Card Current ID cards are second-rate Would reduce illegal entry to U.S. Would prevent illegal aliens from working Would reduce crime Other democratic countries have national ID cards

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 7 Arguments against a National ID Card No card positively guarantees identification No biometric-based system is 100% accurate No evidence it will reduce crime Makes government data mining simpler Make law-abiding people more vulnerable to fraud and indiscretions

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 8 The REAL ID Act Signed in May 2005 Significantly changes driver’s licenses in the United States New licenses Issued by end of 2008 Required to open bank account, fly on commercial airplane, or receive government service Requires applicants to supply 4 different Ids Will probably contain a biometric identifier Must contain data in machine-readable form

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 9 Possible Consequences of New Licenses Better identification means better law enforcement People won’t be able to change identities Parents ducking child support Criminals on the run New, centralized databases could lead to more identity theft

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Introduction Computers getting faster and less expensive Utility of computers increasing Web surfing Shopping Managing personal information Increasing use of computers  growing importance of computer security

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Viruses, Worms, and Trojan Horses Viruses Worms The Internet worm Trojan horses Defensive measures

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Viruses (1/2) Virus: piece of self-replicating code embedded within another program (host) Viruses associated with program files Hard disks, floppy disks, CD-ROMS attachments How viruses spread Diskettes or CDs Files downloaded from Internet

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Viruses (2/2) Well-known viruses Brain Michelangelo Melissa Love Bug Viruses today Commercial antivirus software Few people keep up-to-date

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Worms Worm Self-contained program Spreads through a computer network Exploits security holes in networked computers Famous worms WANK Code Red Sapphire (Slammer) Blaster Sasser

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide The Internet Worm Robert Tappan Morris, Jr. Graduate student at Cornell Released worm onto Internet from MIT computer Effect of worm Spread to 6,000 Unix computers Infected computers kept crashing or became unresponsive Took a day for fixes to be published Impact on Morris Suspended from Cornell 3 years’ probation hours community service $150,000 in legal fees and fines

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Trojan Horses Trojan horse: program with benign capability that masks a sinister purpose Remote access Trojan: Trojan horse that gives attack access to victim’s computer Back Orifice SubSeven RAT servers often found within files downloaded from erotica/porn Usenet sites

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Defensive Measures System administrators play key role Authorization: determining that a user has permission to perform a particular action Authentication: determining that people are who they claim to be Firewall: a computer monitoring packets entering and leaving a local area network

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Phreaks and Hackers Hackers Phone Phreaking The Cuckoo’s Egg Legion of Doom U.S. v. Riggs Steve Jackson Games Retrospective Penalties for Hacking

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Hackers (1/2) Original meaning Explorer Risk-taker Technical virtuoso Hacker ethic Hands-on imperative Free exchange of information Mistrust of authority Value skill above all else Optimistic view of technology

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Hackers (2/2) Meaning of “hacker” changed Movie WarGames Teenagers accessing corporate or government computers Dumpster diving Social engineering Malicious acts Destroying databases Stealing confidential personal information

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Phone Phreaking Phone phreak: someone who manipulates phone system to make free calls Most popular methods Steal long-distance telephone access codes Guess long-distance telephone access codes Use a “blue box” to get free access to long- distance lines Access codes posted on “pirate boards”

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide The Cuckoo’s Egg Clifford Stoll: system administrator at Lawrence Berkeley Laboratory Tracked accounting error, discovered unauthorized user Hacker was accessing military computers FBI, CIA, NSA, AFOSI, DIA joined search Trail led to group of West German hackers

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Legion of Doom Elite group of hackers/phreaks recruited by “Lex Luthor” LOD member Robert Riggs copied E911 Document from a Bell South Computer Craig Neidorf published edited E911 Document in his BBS magazine, Phrack

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide U.S. v. Riggs Riggs and Neidorf arrested Charged with wire fraud Interstate transportation of stolen property valued at $79,449 Computer fraud Riggs pleaded guilty to wire fraud; went to federal prison Neidorf pleaded not guilty Defense showed similar info being sold for < $25 Prosecution moved to dismiss charges

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Steve Jackson Games Steve Jackson Games (SJG) published role-playing games and operated BBS Loyd Blankenship Key SJG employee LOD member Published E911 document on his own BBS Secret Service raided SJG and seized computers, looking for copy of E911 Document Led to creation of Electronic Frontier Foundation EFF backed successful SJG lawsuit of Secret Service

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Retrospective Parallels between hackers and those who download MP3 files Establishment overvalues intellectual property Use of technology as a “joy ride” Breaking certain laws that not that big a deal Parallels between response of Secret Service and response of RIAA Cyberspace is real Those who break the law can be identified Illegal actions can have severe consequences

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Penalties for Hacking Examples of illegal activities Accessing without authorization any Internet computer Transmitting a virus or worm Trafficking in computer passwords Intercepting a telephone conversation, , or any other data transmission Accessing stored messages without authorization Adopting another identity to carry out an illegal activity Maximum penalty: 20 years in prison + $250,000 fine

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Denial-of-Service Attacks Definition Attacks that consume scarce resources Defensive measures Distributed denial-of-service attacks SATAN

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Definition Denial-of-service attack: an intentional action designed to prevent legitimate users from making use of a computer service Goal of attack: disrupt a server’s ability to respond to its clients About 4,000 Web sites attacked each week Asymmetrical attack that may prove popular with terrorists

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Attacks that Consume Scarce Resources SYN flood attack Smurf attack Fill target computer’s hard disk bombing Worm Break-in followed by file copying

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Defensive Measures Physical security of server Benchmarking Disk quota systems Disabling unused network services Turning off routers’ amplifier network capability

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide Distributed Denial-of-Service Attacks Attacker gains access to thousands of computers Launches simultaneous attack on target servers Defensive measures Secure computers to prevent hijackings Check for forged IP addresses

Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide SATAN Security Administrator Tool for Analyzing Networks (SATAN) Allows administrators to test their systems Could be used to probe other computers Critics worried SATAN would turn unskilled teenagers into hackers That never happened