Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Primary Threats to Computer Security
Introduction and Overview of Digital Crime and Digital Terrorism
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
1 Identity Theft and Phishing: What You Need to Know.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
BUSINESS PLUG-IN B6 Information Security.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
FIT3105 Security and Identity Management Lecture 1.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Viruses.
Unit 2 - Hardware Computer Security.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
IT security By Tilly Gerlack.
 a crime committed on a computer network, esp. the Internet.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Identity Theft.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
INTRODUCTION & QUESTIONS.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Learn how to protect yourself against common attacks
IT Security  .
Protect Your Computer Against Harmful Attacks!
Understanding the Need for Security Measures
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
“Credit score vocabulary”
Presentation transcript:

Presentation By Timothy Mangas

Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes (a bank robber may get $2,500 to $5,000 on average; while average loss from computer fraud is $100,000) Crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) Background Information

Why should we worry? Crimes are harder to detect and trace (e.g., the anonymity of the Web) Computing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet.

Hacking Originally, a “hacker” was a creative programmer who wrote elegant or creative code. Sometimes these folks would break into the computer systems at their schools to experiment and have fun; remember that until the PC and the Internet, computing resources were quite restricted.

Hacking The meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). There were also crimes, such as thefts of information and “phone hacking” The case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in He caused several million dollars of damage.

Hacking present Current hacking includes all previous pranks and crimes, but now we have the intricate interconnectedness of the Web. Every networked computer is potentially vulnerable. This includes basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.).

Hacking present Now we have viruses transmitted via that spread in a similar fashion to real diseases (but much faster); there often have to be quarantine procedures. The “Love Bug” from 2000 cost an estimated $10 billion in damage. De facto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable.

Computer Viruses More than 81,000 virus-type threats exist today. This is even more complicated because there are lots of virus hoaxes, which may be in the form of dire warnings about disk-eating (or computer destroying!) attachments that may land in your inbox.

Types of Viruses Malicious worms (e.g., the Love Bug) that propagate via and destroy the contents of computers. Denial-of-service attacks; more recently there are distributed DNS attacks. “Back-door” worms that exploit vulnerabilities to enter surreptitiously and copy private information.

Online Scams Auctions Sell nonexistent/faulty/etc merchandise Response Credit card required to buy or sell Escrow services -- trusted middleman Fraud response: Fraudulent escrow service Shill bidding

More Online Scams Stock fraud Buy a lot of worthless stock Hype it on the internet Sell it all at the new high price The SEC like to get involved in these cases

Identity Theft Steal credit card number: Dumpster diving Dishonest store clerks Phone customer pretending to be bank customer pretending to be bank

More Identity Theft Steal SSN (was DeFacto ID until recently) Use SSN to access records Use SSN + stolen info to get credit card Send bill to PO box ATM Fraud Fake ATM slots in front of real ATM