Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.

Slides:



Advertisements
Similar presentations
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
FIT3105 Security and Identity Management Lecture 1.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 11 Security and Privacy: Computers and the Internet.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Cyber Crimes.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Unethical use of Computers and Networks
CYBER CRIME.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security Debate Why cracking should be criminalized.
INTRODUCTION & QUESTIONS.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Add video notes to lecture
Hackers and Crackers iJacsn.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Anastasios Papaefthimiou Lefteris Tsabras Dimitris Thomadakis
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Cyber Crimes Chunlian QU 9/18/2018.
Five Unethical Uses of Computers
What is Computer Crime? Identity Theft Cyber-Bulling Hacking
Information Systems for Health:
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Privacy, Security, and Ethics
Presentation transcript:

Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft

Computers and Crime When the property damaged, stolen, or lost is electronic information, the “place” broken into is a computer, and the perpetrators are often bright youngsters, the crimes appear to be taken much less seriously by society BUT Not by the Victims. Kershner, Computer Literacy, Kendall Hunt

Hacking Among computer professionals a person who “hacks” at a program is investigating the computer system or a program to better understand it and to get better performance So, in this context hacking is neither unethical or illegal. Kershner, Computer Literacy, Kendall Hunt

Hacking, Cracking & the Press Hacker – someone who illegally breaks into computer systems. Professionals call this person a Cracker. Someone who “cracks” open the computer system Circumventing security procedures May not intend to do damage Electronic Vandals

Crackers (Hackers): Who are They? 1. Computer-competent teens Working from their bedrooms or dorm rooms Just “goofing” around 2. Not all are just for fun Industrial Espionage Disgruntled individuals ? Terrorists? 3. Malicious Individuals Angry former employees Criminals

Hackers and Crackers Why do “kids” hack? Because they can Merely “looking around” reading other people’s is interesting No harm intended The “thrill” of breaking in and breaching the electronic security of the system Gain Knowledge?!?!?

Hacking and Cracking To some it is a never ending, authentic, role-playing game with federal, state and local authorities as the “bad guys!”

Hacking and Cracking At the least intrusive this is the electronic equivalent of voyeurism The privacy of individuals and organizations is being violated Frequently the non-intrusive intent doesn’t quite work out and electronic property is destroyed.

Hacking and Victims Privacy and Security violated Property lost or damaged Down time interrupts businesses Identity and Credit card theft FEAR, ANGER, FRUSTRATION

Hacking and Society’s Response “No one has been hurt” “It’s the company’s fault for not having better security” The “invaded” computer system somehow benefits because security weaknesses have been uncovered “They’re just kids goofing around!”

Hacking and Society Ethical Dilemma: Is this morally wrong? Are these activities illegal? What if anything should we do about this?

Hacking Ponder this: What if it were surface mail and not ? What if the voyeurism were standing outside your dorm room or your sister’s bedroom? What if the break-in where to your house or dorm room and all those who entered did was leave you a note saying: “Ha-ha, I can get in any time!” What if the stolen property was your car? Where sensitive information is involved, can we afford to believe that nothing has been changed or compromised even by accident?

Hacking and Ethics Individuals have the Right to expect their property and privacy protected regardless of the form!

Hackers and Crackers Where to they hack? Sloan Kettering Cancer Institute Los Alamos National Laboratory Credit Card Companies Stolen card numbers Made purchases IDENTITY THEFT School Computers Changed grades Stolen exams

Hackers and Crackers Where do they hack? Burglarized telephone company networks Stole services Accidentally moved satellite orbits disrupting services Disrupted 911 service Stole Credit Card numbers and passwords and posted them to bulletin boards for the “fun of it.”

Hacking and Cracking Are crackers pranksters or criminals? If no one is physically hurt does that make computer eavesdropping right/OK? When crackers violate society’s codes, should they be held less responsible than their street-wise counterparts? Aren’t the crimes the same?