Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.

Similar presentations


Presentation on theme: "CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20."— Presentation transcript:

1 CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20

2 CS 4001Mary Jean Harrold2 Computer Crime

3 CS 4001Mary Jean Harrold3 Why Worry About Computer Crime? ŸCrimes committed using computer or Internet can be more costly (monetarily) than other crimes Ÿe.g., a bank robber may get $2,500 to $5,000 on average; average loss from computer fraud is $100,000) Ÿestimates are that computer crime costs victims in the USA at least $5×10 8 /year, and true value of such crime might be substantially higher ŸComputer crimes are larger and affect more people (a hacker breaking into an e-commerce database can steal hundreds or thousands of credit card numbers) ŸComputer crimes are harder to detect and trace (e.g., the anonymity of the Web) ŸComputing provides new challenges for prevention, detection, and prosecution; challenges that professionals will be asked to meet.

4 CS 4001Mary Jean Harrold4 Why Worry About Computer Crime? What are some examples of computer crime of which you are aware?

5 CS 4001Mary Jean Harrold5 Hacking Discussion ŸUse of the word “hacker” ŸWhat did the word “hacker” mean in the early days of computing (1960-70)? ŸHow did the use of “hacker” change after 1970? ŸJustification of “hacking” ŸHow do hackers justify their activities? ŸWhat are counterarguments to their justifications? ŸWhat are some techniques used to catch hackers? ŸGive examples (real and recent) of a computer crime committed by insiders (employees) in a company? ŸWhat are some problems with electronic voting?

6 CS 4001Mary Jean Harrold6 Hacking 1960-1970 ŸOriginally, a “hacker” was a creative programmer who wrote elegant or creative code. ŸSometimes these folks would break into the computer systems at their schools to experiment and have fun; remember that until the PC and the Internet, computing resources were quite restricted.

7 CS 4001Mary Jean Harrold7 Hacking (cont’d) 1970-1995 ŸThe meaning of hacker began to change. There were incidents of “trophy hacking” (doing it just to show you could do it). ŸThere were also crimes, such as thefts of information and “phone hacking.” ŸThe case of Kevin Mitnick; a notorious hacker who was arrested in 1988 and finally tracked down and arrested again in 1995. He caused several million dollars of damage.

8 CS 4001Mary Jean Harrold8 Hacking (cont’d) After 1995--the Web era ŸCurrent hacking includes all previous pranks and crimes, but now we have the intricate interconnectedness of the Web. ŸEvery networked computer is potentially vulnerable—e.g.,basic infrastructure (water, power, banks, hospitals, transportation, government agencies, telephone companies, etc.). ŸNow we have viruses transmitted via email that spread in a similar fashion to real diseases (but much faster); there often have to be quarantine procedures. Ÿ-The “Love Bug” from 2000 cost an estimated $10 billion in damage. Ÿ-Defacto standard systems (e.g., Microsoft Windows and Outlook) are especially vulnerable; other systems (e.g., Mac OS) are less so; but all are vulnerable.

9 CS 4001Mary Jean Harrold9 Hacking Discussion (cont’d) Do you agree or disagree with the following statement by Ken Thompson (for what is he known?) The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked. Write a paragraph or two. Give reasons.

10 CS 4001Mary Jean Harrold10 Hacking Discussion (cont’d) Consider the following question: Do hackers do public service by finding and publicizing computer security weaknesses? Select a side and write a few because clauses.

11 CS 4001Mary Jean Harrold11 On-line Voting ŸSuppose you are on a consulting team to design a voting system for your state in which people will vote by logging on to a Web site. ŸWhat are some important design considerations? ŸWhat are some pros and cons for such a system? ŸOverall, is it a good idea?

12 CS 4001Mary Jean Harrold12 Computer Viruses ŸMore than 85,000 virus-type threats exist today. ŸComplicated because there are many virus hoaxes, which may be in the form of dire email warnings about disk-eating (or computer destroying!) attachments that may land in your inbox. ŸSee www.sophos.com/virusinfo/ or www.ciac.org/ciac/ciac_virus_info.htmlwww.sophos.com/virusinfo/ www.ciac.org/ciac/ciac_virus_info.html ŸInternet hoaxes—see http://hoaxbusters.ciac.org/http://hoaxbusters.ciac.org/

13 CS 4001Mary Jean Harrold13 Types of Viruses ŸMalicious worms (e.g., the Love Bug) that propagate using email and destroy the contents of computers. ŸDenial-of-service attacks; more recently there are distributed DNS attacks. Ÿ“Back-door” worms that exploit vulnerabilities to enter surreptitiously and copy private information.

14 CS 4001Mary Jean Harrold14 Class discussion for Thursday Ÿ3-minute presentations by each group 1.Handout describes situation 2.Favor of criminal action; defense against criminal action ŸEveryone not on that issue votes for or against the person 1.Student in a course...not responsible 2.Student who activated…responsible 3.President of college…not responsible 4.President of college’s ISP… 5.Director of hospital… ŸDiscuss


Download ppt "CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20."

Similar presentations


Ads by Google