Lecture Material - Powerpoint Version
Download
Report
Transcript Lecture Material - Powerpoint Version
Computer Crime and
Security Measures
Week 5 cont.
Computer Crime
Computers make activities easier
including illegal activities
New ways to commit old crimes
Crimes against
businesses - insiders and
outsiders
hackers, competitors, criminal
gangs
Crime
Computers make crimes
easier to commit
more devastating
harder to detect
doable from long
distances
New Terms
Virus
Worm
Trojan Horse
Trap Door
Fraud and Embezzlement
Embezzlement - fraudulent
appropriation of property by a
person to whom it has been
entrusted
Requires
special knowledge
special programming skill
poor security
Fraud and Embezzlement
Aided by
anonymity
complexities of modern
transactions increase the
opportunities
Packet sniffers
Defending Against
Dishonest Employees
Rotate responsibilities of
employees with access to sensitive
systems
Unique ID and password
Limit access to system
Audit trails
Screening and background checks
of employees
Good security policies, whatever
that is
Defending Against Fraud
Immediate checks on legitimate
credit/debit cards
Programs to detect unusual
spending
Holograms and photos on cards
Magnetic or digital finger printing
Physical hardware deterrents
Why is the Problem so
Big?
Most customers do not
want to verify ID
Most merchants don’t
check
Security vs convenience
Sabotage and Information
Theft
Unhappy employees
Attacks by competitors
Who else?
Nonmalicious Hacking
No harm is done
Service - exposes security
weaknesses
Help create need for tougher
security
Information wants to be free
Some companies are ripping
us off
Harmless?
Time and effort are involved in
tracking down the intruder
and shut off means of access
Verifications of no damage
Uncertainty that system is
preserved
Trespassing is illegal
Mechanisms of Protection
Password protection
Internet
Medium for researchers
open access
ease of use
ease of sharing
Security depended on trust
Attitudes about security have
not caught up with the risk
Improving Security
Awareness of extent of
problem
Education of users
Acceptance of
responsibility
Internet Protection
Firewall
Crime Laws
Computer technology
challenged existing laws and
led to new ones
Larceny
Use of computer time
New laws
Access and use of computer
without authorization is illegal