Chapter 7 Computer Crime, Ethics, and Privacy

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecturer: Fadwa Tlaelan
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 15 Computer Crime and Information Technology Security Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Lesson 19: Configuring Windows Firewall
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
ACCT341, Chapter 11 Computer Crime, Ethics, and Privacy
Chapter 11 Security and Privacy: Computers and the Internet.
Introduction to Databases Chapter 1: Introducing Data and Data Management.
General Awareness Training
ACCOUNTING INFORMATION SYSTEMS
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Crime & Malpractice AS Module Heathcote Ch. 10.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Chapter 9: Introduction to Internal Control Systems
CONTROLLING INFORMATION SYSTEMS
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Add video notes to lecture
Dinesh Mirchandani University of Missouri – St. Louis
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Using Technology to Manage Information
Fundamentals of Information Systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Chapter 7 Computer Crime, Ethics, and Privacy Introduction Computer Crime, Abuse, and Fraud Examples of Computer Crimes Mitigating Computer Crime and Fraud Ethical Issues, Privacy, and Identity Theft

Computer Crime Computer Crime involvement of the computer in a criminal act directly, or indirectly. definition important because it affects how the statistics are accumulated. a small proportion gets detected even smaller proportion gets reported.

Computer Crime & Abuse - the Difference Computer crime involves the manipulation of a computer or computer data, to dishonestly obtain money, acquire property, or get some other advantage of value, or to cause a loss. Computer abuse is when someone’s computer is used or accessed a mischievous manner with a motive of revenge or challenge is punishable in extreme cases

Federal Legislation The Computer Fraud and Abuse Act (CFFA) of 1986 which was amended in 1994 and 1996 Defines computer fraud as an illegal act for which computer technology is essential for its perpetration, investigation, or prosecution. Defines seven fraudulent acts, the first three are described as misappropriation of assets and the last four as “other” crimes

CFAA Fraudulent Acts Unauthorized theft, use, access, modification, copying, or destruction of software or data. Theft of money by altering computer records or the theft of computer time. Intent to illegally obtain information or tangible Property through the use of computers.

CFAA Fraudulent Acts Use or the conspiracy to use computer resources to commit a felony. Theft, vandalism, destruction of computer hardware. Trafficking in passwords or other login information for accessing a computer. Extortion that uses a computer system as a target.

Other Federal Legislation Affecting the Use of Computers Fair Credit Reporting Act of 1970 Freedom of Information Act of 1970 Federal Privacy Act of 1974 Small Business Computer Security and Education Act of 1984 Computer Fraud and Abuse Act of 1986

Federal Legislation Affecting the Use of Computers Computer Fraud and Abuse Act (1996 amendment) Computer Security Act of 1987 USA Patriot Act of 2001 Cyber Security Enhancement Act of 2002 CAN-SPAM Act of 2003

Federal Legislation Affecting the Use of Computers Question Which of the following pieces of computer legislation is probably the most important? a. Cyber Security Enhancement Act of 2002 b. Computer Security Act of 1987 c. The Computer Fraud and Abuse Act of 1986 d. Federal Privacy Act of 1974

The Lack of Computer-Crime Statistics Good data unavailable Three reasons private companies handle abuse internally surveys of computer abuse are often ambiguous most computer abuse is probably not discovered.

The Growth of Computer Crime Computer crime is growing because of Exponential growth in computer resources Internet pages give step-by-step instructions on how to perpetrate computer crime

Importance for Accountants Importance of computer crime and abuse to accountants because AISs help control an organization’s financial resources are favored targets of disgruntled employees seeking financial gain or seeking revenge

Importance for Accountants because they are responsible for designing, implementing, and monitoring the control procedures for AISs. because firms suffer millions of dollars in computer-related losses due to viruses, unauthorized access, and denial of service attacks

Three Representative Computer Crimes Cases Compromising Valuable Information: The TRW Credit Data Case Wire Fraud and Computer Hacking: The Edwin Pena and Robert Moore Case Denial of service: The 2003 Internet Crash Through a very speedy computer worm, the Slammer worm

The TRW Credit Data Case This computer crime is well known involved computerized credit data had two key issues: the propriety of the input information the protection afforded to both consumer and user in the accuracy and use of credit information

The TRW Credit Data Case Question The TRW case is notable because a. the amount of dollars involved was not significant. b. no one got caught. c. the fraud was detected by a surprise audit. d. the real victims were TRW customers.

Methods Used by Criminals Hackers people who break into the computer files of others for fun or personal gain. Shoulder surfing stealing calling credit numbers at public phones Password controls limiting computer access to bona fide users

Methods Used by Criminals Social engineering posing as bona fide employees Lock-out systems disconnecting telephone users after a set number of unsuccessful login attempts Dial-back systems disconnecting all login users, reconnecting legitimate users after checking their passwords

Examples of Computer Crimes. A graduate student infected a computer network with a virus that eventually disrupted over 10,000 separate systems. A company accused a computer-equipment vendor of fraudulently representing the capabilities of a computer system, that the full system was never delivered and that the software was inadequate. In a fit of resentment, a keyboard operator shattered a CRT screen with her high-heeled shoe. Some employees of a credit bureau sent notices to some individuals listed as bad risks in its files.

Examples of Computer Crimes. For a fee, the employees would withhold the damaging information, thereby enhancing the credit worthiness of the applicants. A computer dating service was sued because referrals for dates were few and inappropriate. The owner eventually admitted that no computer was used to match dates, even though the use of a computer was advertised. A programmer changed a dividends-payment program to reduce the dividends of selected stock-holders, and to issue a check to himself for the sum of the reductions—$56,000.

Robert T. Morris and the Internet Virus created one of the world’s most famous computer viruses became first person to be indicted under the Computer Fraud and Abuse Act of 1986 The case illustrated vulnerability of networks to virus infections.

Computer Viruses Computer virus is a program that disrupts normal data processing and that can usually replicate itself onto other files, computer systems or networks. Boot-sector viruses hide in the boot sectors of a disk are accessed there by the operating system every time the system is booted. Worm viruses replicate themselves until the user runs out of memory or disk space.

Computer Virus Programs Trojan Horse programs reside in legitimate copies of computer programs. Logic Bomb programs remain dormant until the computer system encounters a specific condition. A virus may be stored in an applet, which is a small program stored on a WWW server.

Computer Virus Programs Question A computer program that remains dormant until some specified circumstance or date triggers the program to action is called a a. trojan horse b. logic bomb c. data diddling d. cookie

Thwarting Computer Viruses Firewalls which limit external access to the computer. Antivirus software. Antivirus control procedures.

Thwarting Computer Viruses: Anti-Virus Software Anti-virus software includes computer programs that can: scan computer disks for virus-like coding; identify active viruses already lodged in computer systems; cleanse computer systems already infected; perform a combination of these activities.

Drawbacks of Anti-Virus Software Programs Anti-virus programs provide less-than- complete protection because new, more powerful viruses are always being written that can avoid known detection schemes. anti-virus programs can contain virus routines.

Anti-Virus Procedural Controls Buy shrink-wrapped software from reputable sources Avoid illegal software copying Do not download suspicious Internet files Delete email messages from unknown sources before opening them Maintain complete backup files

Organizational Safeguards Against Computer Viruses Educate employees about viruses. Encourage employees to follow virus prevention and detection techniques. Establish policies that discourage the free exchange of computer disks or externally acquired computer programs.

Organizational Safeguards Against Computer Viruses Use computer passwords to thwart unauthorized users from accessing the company’s operating systems and files. Use anti-virus filters on LANs and WANs. Have an approved and tested disaster recovery plan.

Methods for Thwarting Computer Abuse Enlist top management support Increase employee awareness and education Conduct Security Inventory and protect passwords Implement controls Identify computer criminals Look at technical backgrounds, morals, and gender and age

Thwarting Computer Abuse Recognize the symptoms of employee fraud Accounting irregularities such as forged, altered or destroyed input documents Internal control weaknesses Behavioral or lifestyle changes in an employee Unreasonable anomalies that go unchallenged Employ forensic accountants

Computers and Ethical Behavior Ethics a set of moral principles or values governing an organization as well as individuals Ethical behavior making choices and judgments that are morally proper and then acting accordingly.

Ethical Issues Honesty Protecting Computer Systems Protecting Confidential Information Social Responsibility Rights of Privacy Acceptable Use of Computer Hardware and Software.

Encouraging Ethical Behavior Inform employees that ethics are important. Formally expose employees to relevant cases that teach how to act in specific situations. Teach by example, that is, by managers acting responsibly.

Encouraging Ethical Behavior Use job promotions and other benefits to reward those employees who act responsibly. Encourage employees to join professional organizations with codes of conduct such as Codes of Conduct and Good Practice for Certified Computer Professional.

Computers and Privacy Issues Company policies with respect to privacy issues Privacy policy should include who owns the computer for what purposes can the computer be used what uses are authorized or prohibited disposal of computers

Methods Used to Obtain Your Personal Data Shoulder surfing Dumpster diving Applications for “preapproved” credit cards Key logging software Spam and other e-mails

Copyright Copyright 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 7