Lecture Material - Powerpoint Version

Download Report

Transcript Lecture Material - Powerpoint Version

Computer Crime and
Security Measures
Week 5 cont.
Computer Crime
 Computers make activities easier
 including illegal activities
 New ways to commit old crimes
 Crimes against
 businesses - insiders and
outsiders
 hackers, competitors, criminal
gangs
Crime
Computers make crimes
 easier to commit
 more devastating
 harder to detect
 doable from long
distances
New Terms
Virus
Worm
Trojan Horse
Trap Door
Fraud and Embezzlement
 Embezzlement - fraudulent
appropriation of property by a
person to whom it has been
entrusted
 Requires
 special knowledge
 special programming skill
 poor security
Fraud and Embezzlement
Aided by
 anonymity
 complexities of modern
transactions increase the
opportunities
 Packet sniffers
Defending Against
Dishonest Employees
 Rotate responsibilities of
employees with access to sensitive
systems
 Unique ID and password
 Limit access to system
 Audit trails
 Screening and background checks
of employees
 Good security policies, whatever
that is
Defending Against Fraud
 Immediate checks on legitimate
credit/debit cards
 Programs to detect unusual
spending
 Holograms and photos on cards
 Magnetic or digital finger printing
 Physical hardware deterrents
Why is the Problem so
Big?
Most customers do not
want to verify ID
Most merchants don’t
check
Security vs convenience
Sabotage and Information
Theft
Unhappy employees
Attacks by competitors
Who else?
Nonmalicious Hacking
 No harm is done
 Service - exposes security
weaknesses
 Help create need for tougher
security
 Information wants to be free
 Some companies are ripping
us off
Harmless?
 Time and effort are involved in
tracking down the intruder
and shut off means of access
 Verifications of no damage
 Uncertainty that system is
preserved
 Trespassing is illegal
Mechanisms of Protection
Password protection
Internet
 Medium for researchers
 open access
 ease of use
 ease of sharing
 Security depended on trust
 Attitudes about security have
not caught up with the risk
Improving Security
Awareness of extent of
problem
Education of users
Acceptance of
responsibility
Internet Protection
Firewall
Crime Laws
 Computer technology
challenged existing laws and
led to new ones
 Larceny
 Use of computer time
 New laws
 Access and use of computer
without authorization is illegal