1 / 17

Computer Crime and Security Measures

Computer Crime and Security Measures. Week 5 cont. Computer Crime. Computers make activities easier including illegal activities New ways to commit old crimes Crimes against businesses - insiders and outsiders hackers, competitors, criminal gangs. Crime. Computers make the crimes

julie
Download Presentation

Computer Crime and Security Measures

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crime and Security Measures Week 5 cont.

  2. Computer Crime • Computers make activities easier • including illegal activities • New ways to commit old crimes • Crimes against • businesses - insiders and outsiders • hackers, competitors, criminal gangs

  3. Crime • Computers make the crimes • easier to commit • more devastating • harder to detect • doable from long distances

  4. New Terms • Virus • Worm • Trojan Horse • Trap Door

  5. Fraud and Embezzlement • Embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted • Requires • special knowledge • special programming skill • poor security

  6. Fraud and Embezzlement • Aided by • anonymity • complexities of modern transactions increase the opportunities

  7. Defending Against Dishonest Employees • Rotate responsibilities of employees with access to sensitive systems • Unique ID and password • Limit access to system • Audit trails • Screening and background checks of employees • Good security policies

  8. Defending Against Fraud • Immediate checks on legitimate cards • Programs to detect unusual spending • Holograms and photos on cards • Magnetic or digital finger printing • Physical hardware deterrents

  9. Why is the Problem so Big? • Most customers do not want to verify ID • Most merchants don’t check • Security vs convenience

  10. Sabotage and Information Theft • Unhappy employees • Attacks by competitors • Who else?

  11. Nonmalicious Hacking • No harm is done • Service - exposes security weaknesses • Help create need for tougher security • Information wants to be free • Some companies are ripping us off

  12. Harmless? • Time and effort are involved in tracking down the intruder and shut off means of access • Verifications of no damage • Uncertainty that system is preserved • Trespassing is illegal

  13. Mechanisms of Protection • Password protection

  14. Internet • Medium for researchers • open access • ease of use • ease of sharing • Security depended on trust • Attitudes about security have not caught up with the risk

  15. Improving Security • Awareness of extent of problem • Education of users • Acceptance of responsibility

  16. Internet Protection • Firewall

  17. Crime Laws • Computer technology challenged existing laws and led to new ones • Larceny • Use of computer time • New laws • Access and use of computer without authorization is illegal

More Related