© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.

Slides:



Advertisements
Similar presentations
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Auditing Computer-Based Information Systems
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter Extension 1 Information Systems for Collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Technology for Computer Forensics by Alicia Castro.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Competitive Advantage with Information Systems within Organizations
Chapter Extension 22 Managing Computer Security Risk © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Securing Information Systems
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 9 Functional Information Systems Provides greater detail than Chapter.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 7 Competitive Advantage with Information Systems within Organizations.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Computer Security Management: Assessment and Forensics Session 8.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
The State of Computer & Data Security in Corporations Independent Survey.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 11 Information Systems Management Read this unit prior to the presentation.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Securing Information Systems
Introduction to Computer Forensics
Securing Information Systems
Introduction to Computer Forensics
Forensic and Investigative Accounting
Computers: Tools for an Information Age
Introduction to Digital Forensics
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Competitive Advantage with Information Systems within Organizations
Introduction to Digital Forensics
Presentation transcript:

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 2 Software Piracy VideoSoftware Piracy Video (7 min) Compare and contrast the attitudes of the employees toward software piracy in this case with the attitudes of the boss and the legal counsel. (1/2 page word) (this is optional. If you missed a 2 point assignment, I suggest you pass it in) File is linked above video case left columnFile is linked above video case left column (SPA.rm) It takes time refresh if required, or get it below this file in the folder

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 3 In the news (7:08) Public Health Agency computers infected by worm Public Health Agency computers infected by worm

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 4 Agenda 1.What are the three types of computer crime? 2.What is the extent of computer crime? 3.How can computer crime be prevented? 4.What laws pertain to governmental search of computers? 5.What is computer forensics? 6.How should organizations respond to a suspected computer crime?

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 5 Video (7:20) Computer Forensics and Internet Safety

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 6 What Are the Three Types of Computer Crime? Crimes committed using computer Examples: theft of financial assets, phishing, child pornography Crimes committed against a computer Examples: viruses, unauthorized access, theft of proprietary data, theft of computer equipment Crimes where computer was used to store data that can be used as evidence Examples: address books, s. Databases of criminal activity

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 7 What Is the Extent of Computer Crime? Many organizations don’t report crimes Top reported losses Viruses, unauthorized access, laptop theft, theft of proprietary data

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 8 Computer Crime, 2005 US FBI/CSI Survey Figure CE 24-2

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 9 How Can Computer Crime Be Prevented? Develop security plan Manage security risk List assets Determine threats against assets Develop safeguards May be uneconomic to create safeguards Management may accept risk of loss

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 10 In Canada If it is on the office computer it belongs to the company and If it is offensive it can cost a company thousands of dollars and you are unemployed

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 11 What Is Computer Forensics? Forensics Use of science to obtain data for use by legal system Computer forensics Identification, collection, examination, and preservation of digitally recorded data Easy to damage data during process Deleted data not really gone System de-allocates space on disk Data still resides there until over-written Software tools can read de-allocated space

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 12 Computer Forensics, continued Data may be hidden in many locations on network Files can be disguised by name and type Steganography Messages hid by encoding them in files Hidden in essential overhead data Programs for finding steganography are not effective

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 13 Organizational Responses to a Suspected Computer Crime Treat like any other security incident Develop incident response plan Actions should depend upon nature of crime Contain, eradicate, and recover Preserve evidence for prosecution May have to allow attack to continue to gather evidence Balance liability against need to know full nature of attack

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 14 The Sarbanes-Oxley Act of 2002 (US) Revision of Exchange Act of 1934 Enacted to prevent corporate fraud Requires management: Create internal controls for production of financial statements Issue statement attesting to control activities External auditor must issue opinion on quality of controls Exposes both management and external auditor to financial and criminal liability Goal was to upgrade financial reporting

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 15 The Sarbanes-Oxley Act of 2002 (US) Intended to improve trust in financial reports More than 15 percent of IS will be diverted to SOx compliance No one knows exactly what is necessary for compliance Act requires external auditors become more independent Act is vague and is often given broadest possible interpretation Potential for millions of dollars to be wasted in compliance Implications for Canada: If a company is listed on the US stock marked it is subject to US laws