Computer Crime: Criminals of the Future

Download Report

Transcript Computer Crime: Criminals of the Future

Computer Crime
and
Identity Theft
Abe Orabi
Tom Ballaro
Tim Williams
What is Computer Crime?
 Using computer technology to maliciously
affect others
What’s At Risk:
- Intellectual Property
- Personal Information
- Organizational Information
- National and Global Security
Techniques
 Scavenging: for stray data or garbage for clues that




might unlock the secrets of a system
Zapping: which means penetrating a computer by
unlocking the master key to its program and then
destroying it by activating its own emergency program
Worms or worm programs: entail the deletion of
portions of a computer's memory, thus creating a hole of
missing information
Time bombs or Logic bombs: which involve the
insertion of routines that can be triggered later by the
computer's clock or a combination of events. When the
bomb goes off, the entire system, perhaps worth
millions, will crash
Viruses: are self-replicating programs which can have a
similar effect to Time or Logic bombs
Forms Of Computer Crime
Theft of Money
-The transfer of payments to the wrong
accounts
Theft of Personal Information:
- Stealing ones information through use of
computer technology
Theft of Goods
- By their diversion to the wrong destination
Theft of Computer Time:
- Use of an employers computer resources for
personal work
Who are the criminals?
24%
Managers/Supervisors
25%
Computer Staff
People with Little
Computer Skill
20%
31%
Other
What is Identity Theft?
 The criminal act of using stolen
information about a person to assume that
person’s identity
History
Through the creation of online databases,
businesses, and online networks, in the
past 20 years, it
has become easier
to commit identity
theft through the
use of computer crimes.
Ways to Commit Identity Theft
Computer as a Tool:
Hacking into databases:
- Social Security Numbers
- Credit Card Information
- License Information
Ways to Commit Identity Theft
Computer as an Object:
Internet Fraud:
- Applying for Credit Cards
- Buying goods
- Money Transfers
Ways to Prevent Identity Theft
 Computer Protection
- Passwords
- Firewalls
- Data Encryption
 Personal Protection
- Keep a watchful eye on bank
accounts and credit statements
I am a Victim, What Should I do?
 Close the accounts you know or you think
may have been compromised
 File a report with the state or local police
 File a complaint with the FTC
Any Questions?