1 / 17

Computer Crime

Computer Crime. The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates state or federal laws and involves using a computer.

agalia
Download Presentation

Computer Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crime • The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. • Computer crime is any act that violates state or federal laws and involves using a computer. • The term cybercrime often refers specifically to crimes carried out by means of the Internet. • Due to computer crime, businesses lose money in the following ways: staff time, downtime, and bad publicity

  2. Computer Crime cont. • Even if intruders steal nothing from a business, they still cost companies money. • Staff must make the network secure again and consider how to stop security breaches. • Security breaches also cost a company in terms of downtime, or a temporary stop to work. • System administrators sometimes shut a network down to prevent the loss of data. • While the system is down, workers cannot do their jobs. • A company can lose business if customers are affected by downtime.

  3. Computer Crime cont. • Many companies refuse to announce that a computer crime has been committed against them. • If customers learn that someone has stolen their personal information from a company’s network, they may decide that the company is not able to keep such information safe. • This can cause customers to stop doing business with the company.

  4. Computer Crime cont. • There are many different kinds of computer crime. Some of them require criminals to have a deep knowledge of programming. • A virus is a program that performs one or more tasks that the user doesn’t expect. • Some viruses are designed to do real harm, such as delete files, slow down network traffic, disable programs, or allow an unauthorized person to access the victim’s computer. • Most viruses are designed to hide themselves, avoiding detection by the victim for as long as possible.

  5. Computer Crime cont. • If a virus is copied to your computer, the machine is said to be “infected.” • A virus can infect your computer in a number of ways. • You might receive an infected disk from a friend. • You might download an infected file from a Web site . • You might receive it attached to an e-mail message. • Most viruses can affect only the operating system in which they were written, but they can spread from one computer to another.

  6. Computer Crime cont. • A macro virus takes advantage of the macro languages in application programs, such as word processors or spreadsheets. • Macro viruses launch themselves when an infected file is opened. • These viruses are different from normal viruses because they can work on different operating systems.

  7. Computer Crime cont. • The most common computer viruses work by hiding inside another program. • When you run the program, the virus activates and does its work. • A worm is a type of virus that doesn’t need to be hidden inside another program. However, they are hidden inside document files in the form of macros. • In most cases, a worm’s job is to replicate itself as much as possible, consuming the victim’s disks and memory. • Worms often spread by traveling through network connections. • Many e-mail viruses are actually worms. • They distribute themselves by creating e-mail messages and mailing themselves to other computers.

  8. Computer Crime cont. • A Trojan horse is a program that does something useful but at the same time, hidden from view, does something destructive. • It can damage the system it enters, including erasing all the data on a hard drive. • A Trojan horse might come in the form of a simple game. When the victim plays the game, the program does something else in the background, such as opening a port on the computer. • Someone can then use this port to access the computer through the Internet.

  9. Computer Crime cont. • Some computer crimes have nothing to do with programming. • Criminals use a computer to commit theft. • Internet advertisements and e-mail messages might claim that you can make huge sums of money with very little effort. All you have to do is send money to receive full instructions. • This is a scam—just a trick to get your money.

  10. Computer Crime cont. • Another type of cybercrime is fraud. • When someone steals your personal information, her or she can impersonate you and make credit card purchases in your name or access your bank accounts. • This leaves you with bills and a damaged credit rating.

  11. Computer Crime cont. • The vast majority of computer thefts occur “on the inside” (by employees), leaving no signs of forced entry. • The hardest crime to detect is memory shaving. • In this act, a thief steals some of a computer’s memory chips but leaves enough so the computer will start. The crime might go unnoticed for days or weeks. • Some Web servers are not properly secured. As a result, intruders can vandalize a Web site by placing prank material on it.

  12. Computer Crime cont. • One kind of computer crime is very wide-spread. It is called software piracy, the illegal copying of computer programs. • One business group estimates that about one third of all software in use is pirated. • Most programs that people buy are licensed only to the purchaser. It is illegal to accept a copy of software from someone else or for you to copy a program and give it to a friend. • Software piracy causes software publishers to lose money.

  13. Cybercrime Techniques • Many cybercrimes are based on the ability of people to tap illegally into computer networks. • Some intruders develop programs that try many different passwords until one works. • This is called scanning, or probing. • Networks can be blocked from scanners by limiting the number of failed attempts to log onto the system. • After three password failures, the network can refuse access. • This limits scanners’ chances to determine a valid password.

  14. Cybercrime Techniques cont. • A program called a superzapper allows authorized users to access a network in an emergency situation by skipping security measures. • In the hands of an intruder, a superzapper opens the possibility of damage to the system. • Some intruders spoof, or use a false Internet Protocol (IP) or e-mail address to gain access. • Intruders assume the IP address of a trusted source to enter a secure network. Using that address, they send e-mails that have destructive attachments, such as viruses. • The recipient opens the attachments, letting the virus damage the system.

  15. Cybercrime Techniques cont. • A time bomb is a program that sits on a system until a certain event or set of circumstances activates the program. • Some employees may create a trap door, or a secret way into the system. • Once they quit working for an employer, they can use this to access the system and damage it. • Not all trap doors are viruses, but some viruses are trap doors. Many Trojan horse programs, act as trap doors.

  16. Cybercrime Techniques cont. • Law enforcement officials are using technology to catch cybercriminals. Several groups have taken part in this effort: • Computer Crime and Intellectual Property Section (CCIPS)-The Department of Justice created a special group known as CCIPS to advise and train federal prosecutors and local law enforcement on cybercrime. They review and propose new laws. They coordinate international efforts to combat computer crime and prosecute offenders.

  17. Cybercrime Techniques cont. • Computer Hacking and Intellectual Property Project (CHIP)-In the CHIP project, law enforcement officials and prosecutors work closely together to pursue cybercrime. CHIP offices are in areas with a heavy concentration of computer companies. • National Infrastructure Protection Center (NIPC)-In 1998, government officials became worried about terrorist attacks on U.S. computer systems. Staffed by people from intelligence agencies and private companies such as Internet service providers, the NIPC ensures that the nation’s computer system could continue to operate in the case of an attack.

More Related