SlideShare uma empresa Scribd logo
1 de 21
A Gift of Fire, 2ed Chapter 7: Computer Crime 1
Social, Legal, and Ethical Issues for Computers
and the Internet
Computer Crime
A Gift of Fire, 2ed Chapter 7: Computer Crime 2
A Gift of Fire
Computer Crime
Introduction
Hacking
Online Scams
Fraud, Embezzlement, Sabotage, Information Theft, and Forgery
Crime Fighting Versus Privacy and Civil Liberties
A Gift of Fire, 2ed Chapter 7: Computer Crime 3
Introduction
Computers Are Tools
Computers assist us in our work, expand our thinking, and
provide entertainment.
Computers Are Used to Commit Crimes
Preventing, detecting, and prosecuting computer crime is a
challenge.
A Gift of Fire, 2ed Chapter 7: Computer Crime 4
Hacking
The Phases of Hacking
Phase One: The early years
• 1960s and 1970s.
• Originally, hacker referred to a creative programmer wrote clever code.
• The first operating systems and computer games were written by
hackers.
• The term hacking was a positive term.
• Hackers were usually high-school and college students.
Q: Describe a modern-day version of “clever” hacks.
A Gift of Fire, 2ed Chapter 7: Computer Crime 5
Hacking
The Phases of Hacking (cont’d)
Phase Two: Hacking takes on a more negative meaning.
• 1970s through 1990s.
• Authors and the media used the term hacker to describe someone who
used computers, without authorization, sometimes to commit crimes.
• Early computer crimes were launched against business and
government computers.
• Adult criminals began using computers to commit their crimes.
Q: Distinguish between the hacking done by Kevin Mitnick and Robert J.
Morris.
A Gift of Fire, 2ed Chapter 7: Computer Crime 6
Hacking
The Phases of Hacking
Phase Three: The Web Era
• Beginning in the mid-1990s.
• The increased use of the Internet for school, work, business
transactions, and recreation makes it attractive to criminals with basic
computer skills.
• Crimes include the release of malicious code (viruses and worms).
• Unprotected computers can be used, unsuspectingly, to accomplish
network disruption or commit fraud.
• Hackers with minimal computer skills can create havoc by using
malicious code written by others.
Q: Why are denial-of-service attacks difficult to prevent?
A Gift of Fire, 2ed Chapter 7: Computer Crime 7
Hacking
Hactivism
…is the use of hacking expertise to promote a political cause.
• This kind of hacking can range from mild to destructive activities.
• Some consider hactivism as modern-age civil disobedience.
• Others believe hactivism denies others their freedom of speech and
violates property rights.
Q: Argue the case that hactivism is ethical.
A Gift of Fire, 2ed Chapter 7: Computer Crime 8
Hacking
The Law
Computer Fraud and Abuse Act (CFAA, 1986)
• It is a crime to access, alter, damage, or destroy information on a
computer without authorization.
• Computers protected under this law include:
– government computers,
– financial systems,
– medical systems,
– interstate commerce, and
– any computer on the Internet.
Q: Is your personal computer protected under this law?
A Gift of Fire, 2ed Chapter 7: Computer Crime 9
Hacking
The Law (cont’d)
USA Patriot Act (USAPA, 2001)
• Amends the CFAA.
• Allows for recovery of losses due to responding to a hacker attack,
assessing damages, and restoring systems.
• Higher penalties can be levied against anyone hacking into computers
belonging to criminal justice system or the military.
• The government can monitor online activity without a court order.
Q: Are anti-hacking laws adequate?
A Gift of Fire, 2ed Chapter 7: Computer Crime 10
Hacking
Catching Hackers
… requires law enforcement to recognize and respond to myriad
hacking attacks.
Computer forensics tools may include:
• Undercover agents,
• Honey pots (sting operations in cyberspace),
• Archives of online message boards,
• Tools for recovering deleted or coded information.
Computer forensics agencies and services include:
• Computer Emergency Response Team (CERT),
• National Infrastructure Protection Center (NIPC),
• Private companies specializing in recovering deleted files and e-mail,
tracking hackers via Web site and telephone logs, etc..
Q: What computer forensics tools or agencies have been in the news lately?
A Gift of Fire, 2ed Chapter 7: Computer Crime 11
Hacking
Questions About Penalties
Intent
• Should hackers who did not intend to do damage or harm be punished
differently than those with criminal intentions?
Age
• Should underage hackers receive a different penalty than adult
hackers?
Damage Done
• Should the penalty correspond to the actual damage done or the
potential for damage?
A Gift of Fire, 2ed Chapter 7: Computer Crime 12
Hacking
Security
Security weaknesses can be found in the computer systems
used by:
• businesses,
• government (classified and unclassified), and
• personal computers.
Causes of security weakness:
• characteristics of the Internet and Web,
• human nature,
• inherent complexity of computer systems.
Q: How secure is your computer at home? At work?
A Gift of Fire, 2ed Chapter 7: Computer Crime 13
Hacking
Security can be improved by:
• Ongoing education and training to recognize the risks.
• Better system design.
• Use of security tools and systems.
• Challenging “others” to find flaws in systems.
• Writing and enforcing laws that don’t stymie research and
advancement.
Q: Does weak security justify intrusion?
A Gift of Fire, 2ed Chapter 7: Computer Crime 14
Online Scams
Auctions
Selling and buying goods online has become popular.
Problems:
• sellers don’t send the goods,
• sellers send inferior goods,
• price is driven up by shill bidding, and
• illegal goods sold.
Solutions:
• educate customers,
• read seller “reviews,”
• use third-party escrow, and
• more…
A Gift of Fire, 2ed Chapter 7: Computer Crime 15
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Some Causes of Fraud
Credit-Card
• Stolen receipts, mailed notices, and cards.
• Interception of online transaction or weak e-commerce security.
• Careless handling by card-owner.
ATM
• Stolen account numbers and PINs.
• Insider knowledge.
• A counterfeit ATM.
Telecommunications
• Stolen long-distance PINs.
• Cloned phones.
Q: What is the legal definition of fraud? Embezzlement? Sabotage? Theft?
A Gift of Fire, 2ed Chapter 7: Computer Crime 16
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Some Defenses Against Fraud
Credit-Card
• Instant credit-card check.
• Analysis of buying patterns.
• Analysis of credit card applications (to detect identity theft).
• Verify user with Caller ID.
ATM
• Redesigned ATMs.
• Limited withdrawal.
Telecommunications
• match phone “signature” with serial number.
• identify phone without broadcasting serial number.
Q: Identify a business’ defense against fraud that you have witnessed.
A Gift of Fire, 2ed Chapter 7: Computer Crime 17
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Embezzlement and Sabotage
Some Causes
• Insider information.
• Poor security.
• Complex financial transactions.
• Anonymity of computer users.
Some Defenses
• Rotate employee responsibility.
• Require use of employee ID and password .
• Implement audit trails.
• Careful screening and background checks of employees.
A Gift of Fire, 2ed Chapter 7: Computer Crime 18
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Identity Theft
Some Causes of Identity Theft
• Insecure and inappropriate use of Social Security numbers.
• Careless handling of personally identifiable information.
• Weak security of stored records.
• Insufficient assistance to identity theft victims.
Some Defenses for Identity Theft
• Limit use of personally identifiable information.
• Increase security of information stored by businesses and government
agencies.
• Improve methods to accurately identify a person.
• Educate consumers.
Q: What measures do you take to reduce the risk of theft of your identity?
A Gift of Fire, 2ed Chapter 7: Computer Crime 19
Fraud, Embezzlement, Sabotage,
Identity Theft, and Forgery
Forgery
Some Causes
• Powerful computers and digital manipulation software.
• High-quality printers, copiers, and scanners.
Some Defenses
• Educate consumers and employees.
• Use anti-counterfeiting techniques during production.
• Use counterfeit detection methods.
• Create legal and procedural incentives to improve security.
Q: How would you educate your peers about the risks of digital forgery? A
parent? A child?
A Gift of Fire, 2ed Chapter 7: Computer Crime 20
Crime Fighting vs
Privacy and Civil Liberties
Scams
Crime Fighting
• Automated surveillance software to look for suspicious Web activity.
Privacy and Civil Liberties
• No search warrant nor proof of probable cause.
Biometrics
Crime Fighting
• Exact match of biological characteristics to a unique person.
Privacy and Civil Liberties
• Easy to build complete dossier on people.
Q: How much of your privacy and civil liberties are you willing to give up
in order to allow law enforcement to better fight computer crime?
A Gift of Fire, 2ed Chapter 7: Computer Crime 21
Crime Fighting vs
Privacy and Civil Liberties
Search and Seizure of Computers
Crime Fighting
• Obtain evidence of a crime.
Privacy and Civil Liberties
• Day-to-day business ceases; non-criminal contact with others ends.
The Cybercrime Treaty
Crime Fighting
• U.S. and European governments agree to cooperate with investigations.
Privacy and Civil Liberties
• Potential for government spying is great.
Q: Might there be incriminating data stored about you in the logs of your ISP?

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 

Semelhante a Computer crime

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018bhagyasri patel
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfShylesh BC
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it startedNavjyotsinh Jadeja
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 

Semelhante a Computer crime (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

Mais de Uc Man

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linuxUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Professionalism
ProfessionalismProfessionalism
ProfessionalismUc Man
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2Uc Man
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Effective time-management
Effective time-managementEffective time-management
Effective time-managementUc Man
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Course outline pp
Course outline ppCourse outline pp
Course outline ppUc Man
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practiceUc Man
 
Time management
Time managementTime management
Time managementUc Man
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritizationUc Man
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Uc Man
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 

Mais de Uc Man (20)

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linux
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 
Digital divide
Digital divideDigital divide
Digital divide
 
Course outline pp
Course outline ppCourse outline pp
Course outline pp
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practice
 
Time management
Time managementTime management
Time management
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritization
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 

Último

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 

Último (20)

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 

Computer crime

  • 1. A Gift of Fire, 2ed Chapter 7: Computer Crime 1 Social, Legal, and Ethical Issues for Computers and the Internet Computer Crime
  • 2. A Gift of Fire, 2ed Chapter 7: Computer Crime 2 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information Theft, and Forgery Crime Fighting Versus Privacy and Civil Liberties
  • 3. A Gift of Fire, 2ed Chapter 7: Computer Crime 3 Introduction Computers Are Tools Computers assist us in our work, expand our thinking, and provide entertainment. Computers Are Used to Commit Crimes Preventing, detecting, and prosecuting computer crime is a challenge.
  • 4. A Gift of Fire, 2ed Chapter 7: Computer Crime 4 Hacking The Phases of Hacking Phase One: The early years • 1960s and 1970s. • Originally, hacker referred to a creative programmer wrote clever code. • The first operating systems and computer games were written by hackers. • The term hacking was a positive term. • Hackers were usually high-school and college students. Q: Describe a modern-day version of “clever” hacks.
  • 5. A Gift of Fire, 2ed Chapter 7: Computer Crime 5 Hacking The Phases of Hacking (cont’d) Phase Two: Hacking takes on a more negative meaning. • 1970s through 1990s. • Authors and the media used the term hacker to describe someone who used computers, without authorization, sometimes to commit crimes. • Early computer crimes were launched against business and government computers. • Adult criminals began using computers to commit their crimes. Q: Distinguish between the hacking done by Kevin Mitnick and Robert J. Morris.
  • 6. A Gift of Fire, 2ed Chapter 7: Computer Crime 6 Hacking The Phases of Hacking Phase Three: The Web Era • Beginning in the mid-1990s. • The increased use of the Internet for school, work, business transactions, and recreation makes it attractive to criminals with basic computer skills. • Crimes include the release of malicious code (viruses and worms). • Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud. • Hackers with minimal computer skills can create havoc by using malicious code written by others. Q: Why are denial-of-service attacks difficult to prevent?
  • 7. A Gift of Fire, 2ed Chapter 7: Computer Crime 7 Hacking Hactivism …is the use of hacking expertise to promote a political cause. • This kind of hacking can range from mild to destructive activities. • Some consider hactivism as modern-age civil disobedience. • Others believe hactivism denies others their freedom of speech and violates property rights. Q: Argue the case that hactivism is ethical.
  • 8. A Gift of Fire, 2ed Chapter 7: Computer Crime 8 Hacking The Law Computer Fraud and Abuse Act (CFAA, 1986) • It is a crime to access, alter, damage, or destroy information on a computer without authorization. • Computers protected under this law include: – government computers, – financial systems, – medical systems, – interstate commerce, and – any computer on the Internet. Q: Is your personal computer protected under this law?
  • 9. A Gift of Fire, 2ed Chapter 7: Computer Crime 9 Hacking The Law (cont’d) USA Patriot Act (USAPA, 2001) • Amends the CFAA. • Allows for recovery of losses due to responding to a hacker attack, assessing damages, and restoring systems. • Higher penalties can be levied against anyone hacking into computers belonging to criminal justice system or the military. • The government can monitor online activity without a court order. Q: Are anti-hacking laws adequate?
  • 10. A Gift of Fire, 2ed Chapter 7: Computer Crime 10 Hacking Catching Hackers … requires law enforcement to recognize and respond to myriad hacking attacks. Computer forensics tools may include: • Undercover agents, • Honey pots (sting operations in cyberspace), • Archives of online message boards, • Tools for recovering deleted or coded information. Computer forensics agencies and services include: • Computer Emergency Response Team (CERT), • National Infrastructure Protection Center (NIPC), • Private companies specializing in recovering deleted files and e-mail, tracking hackers via Web site and telephone logs, etc.. Q: What computer forensics tools or agencies have been in the news lately?
  • 11. A Gift of Fire, 2ed Chapter 7: Computer Crime 11 Hacking Questions About Penalties Intent • Should hackers who did not intend to do damage or harm be punished differently than those with criminal intentions? Age • Should underage hackers receive a different penalty than adult hackers? Damage Done • Should the penalty correspond to the actual damage done or the potential for damage?
  • 12. A Gift of Fire, 2ed Chapter 7: Computer Crime 12 Hacking Security Security weaknesses can be found in the computer systems used by: • businesses, • government (classified and unclassified), and • personal computers. Causes of security weakness: • characteristics of the Internet and Web, • human nature, • inherent complexity of computer systems. Q: How secure is your computer at home? At work?
  • 13. A Gift of Fire, 2ed Chapter 7: Computer Crime 13 Hacking Security can be improved by: • Ongoing education and training to recognize the risks. • Better system design. • Use of security tools and systems. • Challenging “others” to find flaws in systems. • Writing and enforcing laws that don’t stymie research and advancement. Q: Does weak security justify intrusion?
  • 14. A Gift of Fire, 2ed Chapter 7: Computer Crime 14 Online Scams Auctions Selling and buying goods online has become popular. Problems: • sellers don’t send the goods, • sellers send inferior goods, • price is driven up by shill bidding, and • illegal goods sold. Solutions: • educate customers, • read seller “reviews,” • use third-party escrow, and • more…
  • 15. A Gift of Fire, 2ed Chapter 7: Computer Crime 15 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Some Causes of Fraud Credit-Card • Stolen receipts, mailed notices, and cards. • Interception of online transaction or weak e-commerce security. • Careless handling by card-owner. ATM • Stolen account numbers and PINs. • Insider knowledge. • A counterfeit ATM. Telecommunications • Stolen long-distance PINs. • Cloned phones. Q: What is the legal definition of fraud? Embezzlement? Sabotage? Theft?
  • 16. A Gift of Fire, 2ed Chapter 7: Computer Crime 16 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Some Defenses Against Fraud Credit-Card • Instant credit-card check. • Analysis of buying patterns. • Analysis of credit card applications (to detect identity theft). • Verify user with Caller ID. ATM • Redesigned ATMs. • Limited withdrawal. Telecommunications • match phone “signature” with serial number. • identify phone without broadcasting serial number. Q: Identify a business’ defense against fraud that you have witnessed.
  • 17. A Gift of Fire, 2ed Chapter 7: Computer Crime 17 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Embezzlement and Sabotage Some Causes • Insider information. • Poor security. • Complex financial transactions. • Anonymity of computer users. Some Defenses • Rotate employee responsibility. • Require use of employee ID and password . • Implement audit trails. • Careful screening and background checks of employees.
  • 18. A Gift of Fire, 2ed Chapter 7: Computer Crime 18 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Identity Theft Some Causes of Identity Theft • Insecure and inappropriate use of Social Security numbers. • Careless handling of personally identifiable information. • Weak security of stored records. • Insufficient assistance to identity theft victims. Some Defenses for Identity Theft • Limit use of personally identifiable information. • Increase security of information stored by businesses and government agencies. • Improve methods to accurately identify a person. • Educate consumers. Q: What measures do you take to reduce the risk of theft of your identity?
  • 19. A Gift of Fire, 2ed Chapter 7: Computer Crime 19 Fraud, Embezzlement, Sabotage, Identity Theft, and Forgery Forgery Some Causes • Powerful computers and digital manipulation software. • High-quality printers, copiers, and scanners. Some Defenses • Educate consumers and employees. • Use anti-counterfeiting techniques during production. • Use counterfeit detection methods. • Create legal and procedural incentives to improve security. Q: How would you educate your peers about the risks of digital forgery? A parent? A child?
  • 20. A Gift of Fire, 2ed Chapter 7: Computer Crime 20 Crime Fighting vs Privacy and Civil Liberties Scams Crime Fighting • Automated surveillance software to look for suspicious Web activity. Privacy and Civil Liberties • No search warrant nor proof of probable cause. Biometrics Crime Fighting • Exact match of biological characteristics to a unique person. Privacy and Civil Liberties • Easy to build complete dossier on people. Q: How much of your privacy and civil liberties are you willing to give up in order to allow law enforcement to better fight computer crime?
  • 21. A Gift of Fire, 2ed Chapter 7: Computer Crime 21 Crime Fighting vs Privacy and Civil Liberties Search and Seizure of Computers Crime Fighting • Obtain evidence of a crime. Privacy and Civil Liberties • Day-to-day business ceases; non-criminal contact with others ends. The Cybercrime Treaty Crime Fighting • U.S. and European governments agree to cooperate with investigations. Privacy and Civil Liberties • Potential for government spying is great. Q: Might there be incriminating data stored about you in the logs of your ISP?