Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Ethical Issues of Computer Networks
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
Social Implications of a Computerized Society Lecture 4 Computer Crime Instructor: Oliver Schulte Simon Fraser University.
A Gift of Fire Third edition Sara Baase
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
Legal and Ethical Issues: Privacy and Security Chapter Five.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
A Gift of Fire Fourth edition Sara Baase
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Crime CS4020.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Web server security Dr Jim Briggs WEBP security1.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IS 490 Notes for Baase Textbook, Chapter 5. Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Chris Simpson, Julie Dunbar, and Thomas Taylor.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Keeping you and your computer safe in the digital world.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
PowerPoint® Slides to Accompany
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
HOW DO I KEEP MY COMPUTER SAFE?
A Gift of Fire Third edition Sara Baase
Computer Security.
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime

2 What We Will Cover Hacking Identity Theft and Credit Card Fraud Scams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web

3 Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s –It was a positive term –A "hacker" was a creative programmer who wrote elegant or clever code –A "hack" was an especially clever piece of code

4 Hacking (cont.) Phase 2: 1970s to mid 1990s –Hacking took on negative connotations( دلالات ) –Breaking into computers for which the hacker does not have authorized access –Includes the spreading of computer worms and viruses. –Companies began using hackers to analyze and improve security

5 Hacking (cont.) Phase 3: beginning with the mid 1990s –The growth of the Web changed hacking; viruses and worms could be spread rapidly –Political hacking (Hacktivism) surfaced –Denial-of-service (DoS) attacks used to shut down Web sites –Large scale theft of personal and financial information

6 Denial-of-service attack A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload.server overload In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service.resources

7 Hacking (cont.) Hacktivism, or Political Hacking: Use of hacking to promote a political cause( الترويج لقضية سياسية ) Some use the appearance of hacktivism to hide other criminal activities

8 Hacking (cont.) The Law: Catching and Punishing Hackers: 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) –Covers( يغطي ) government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet –The USA Patriot Act( فعل ) expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems

9 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): A variety of methods for catching hackers –Law enforcement agents read hacker newsletters (A weekly newsletter of the best articles on startups, technology, programming, and more. All links are created by hand from the popular Hacker News site. ) and participate in chat rooms undercover –They can often track a handle by looking through newsgroup archives –Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study –Computer forensics(الطب الشرعي ) is used to retrieve evidence from computers

10 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Security –Internet started with open access as a means of sharing information for research –Attitudes about security were slow to catch up with the risks –Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity –Security is often playing catch-up to hackers as new vulnerabilities (نقاط الضعف ) are discovered and exploited(استغلال )

11 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.): Responsibility for Security –Developers have a responsibility to develop with security as a goal –Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding –Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti- spyware)

12 Identity Theft and Credit Card Fraud Stealing Identities: Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person –Use credit/debit card numbers, personal information, and social security numbers –18-29 year-olds are the most common victims because they use the web most and are unaware of risks –E-commerce has made it easier to steal card numbers and use without having the physical card

13 Identity Theft and Credit Card Fraud (cont.) Stealing Identities (cont.): Techniques used to steal personal and financial information –Phishing - fishing for personal and financial information disguised( متنكر ) as legitimate business –Pharming - false Web sites that fish for personal and financial information by planting( زرع ) false URLs in Domain Name Servers –Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft

14 Identity Theft and Credit Card Fraud (cont.) Stealing Identities (cont.): Techniques used to protect personal and financial information –Activation for new credit cards –Retailers( تجار التجزئة ) do not print the full card number and expiration date on receipts –Software detects unusual spending activities and will prompt retailers to ask for identifying information –Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger

15 Identity Theft and Credit Card Fraud (cont.) Responses to Identity Theft: Authentication of and Web sites Use of encryption to securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security In the event information is stolen, a fraud alert can flag your credit report;

16 Identity Theft and Credit Card Fraud (cont.) Biometrics: Biological characteristics unique to an individual No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed

17 Scams and Forgery ( الحيل والتزوير ) Auctions: ( المزادات ) FTC reports that online auction sites are one of the top sources of fraud complaints( الشكاوى ) –Some sellers do not send items or send inferior products( منتجات رديئة ) –Shill bidding( العطاءات ) is used to artificially(بشكل مصطنع ) raise prices –Sellers give themselves or friends glowing reviews to garner consumer trust Auction sites use various techniques to counter dishonest(غير أمين ) sellers

18 Scams and Forgery (cont.) Click fraud - repeated clicking on an ad( إعلان ) to either increase a site’s revenue or to use up a competitor's advertising budget Stock fraud - most common method is to buy a stock low, send out s urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery( التزوير ) - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment

19 Crime Fighting Versus Privacy and Civil Liberties Search and Seizure( مصادرة ) of Computers: Requires a warrant to search and seize a computer –Court rulings inconclusive( غير حاسم ) about whether information found on computers, but not covered by a warrant, is considered in ‘plain(عادي ) view’ Automated searches –Can monitor constantly and less likely to miss suspicious activity –Can be programmed to only look for what is covered in a warrant

20 Crime Fighting Versus Privacy and... (cont.) The Issue of Venue( مكان ): Charges are generally filed where the crime occurs Laws differ between states and countries Where charges are filed may have significant impact if community standards apply The FBI usually files in the state where the crime was discovered and the investigation began

21 Crime Fighting Versus Privacy and... (cont.) Cybercrime( الجريمة الإلكترونية ) Treaty: International agreement to foster( تعزيز ) international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography( إباحية ), fraud, hacking and other online fraud Treaty(معاهدة ) sets common standards or ways to resolve international cases

22 Whose Laws Rule the Web When Digital Actions Cross Borders: Laws vary from country to country Corporations that do business in multiple countries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution( مقاضاة ) in another country where their actions are illegal

23 Whose Laws Rule the Web (Cont.) Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain)

24 Whose Laws Rule the Web (Cont.) Libel, Speech and Commercial Law: Even if something is illegal in both countries, the exact law and associated penalties may vary Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may require numerous trips Freedom of speech suffers if businesses follow laws of the most restrictive countries

25 Whose Laws Rule the Web Discussion Questions What suggestions do you have for resolving the issues created by differences in laws between different countries? What do you think would work, and what do you think would not?