1 / 25

COMPUTER CRIME

COMPUTER CRIME. An Overview. Agenda. Background and History Potential Criminals Ethics Survey Criminal Activity Preventative Measures. I. Background & History. Evolution of the Information Age. Growth Projections Internet The Inevitable. I. Background & History.

gwennan
Download Presentation

COMPUTER CRIME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER CRIME An Overview

  2. Agenda • Background and History • Potential Criminals • Ethics Survey • Criminal Activity • Preventative Measures

  3. I. Background & History Evolution of the Information Age • Growth Projections • Internet • The Inevitable

  4. I. Background & History Escalation and Frequency 5-year increase

  5. I. Background & History Escalation and Frequency FBI Computer Crimes Division Reports: • 15 security breaches every day • 75% annual increase in recent years

  6. I. Background & History Escalation and Frequency Department of Defense Study 1072 7470 7860 390 # of successful system attacks (8932 attempts) # of detections (out of 7860 successful attempts)

  7. I. Background & History Intrusion Costs Ernst and Young Survey: • More than 1/2 incurred a loss • Each loss exceeded $100,000 • Seventeen losses exceeded $1,000,000

  8. I. Background & History Case Study Hacker Penetrates Citibank System

  9. I. Background & History Case Study Hacker Penetrates Citibank System • The criminals • The crime • The result

  10. II. Potential Criminals Employees/Ex-employees % of crimes committed • Users • Analysts • Programmers 20% 80%

  11. III. Ethics Survey Case Study # Agreeing % Agreeing 1. A person is justified 11 5% in making copies of employers software. 2. I would copy software 75 41% (illegally) for my use. 3. A user is justified in 6 3% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 11 5% in making copies of employers software. 2. I would copy software 75 41% (illegally) for my use. 3. A user is justified in 6 3% accessing / using the services ( of another company’s computer ) to his advantage.

  12. III. Ethics Survey Case Study # Agreeing % Agreeing 4. I would crack a com- 15 7% puter if I knew how. 5. There is nothing wrong 21 10% in writing a virus program to output the message “Have a nice day.” 6. Management can be so 15 7% unfair at times that a person can be justified in erasing files.

  13. III. Ethics Survey Case Study # Agreeing % Agreeing 7. I would adjust a 15 7% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 13 6% with cracking another company’s computer to identify other customers to sell to.

  14. IV. Criminal Activity Hacking The technical-minded crime

  15. IV. Criminal Activity Viruses Nondestructive or Malevolent

  16. IV. Criminal Activity Trojan Horse • History • Vehicle for viruses and logic bombs

  17. IV. Criminal Activity Fraud and Abuse Case Studies • Race Track Trifecta • Huntsville Prison • Robin Hood of Northwest

  18. IV. Criminal Activity Theft Unauthorized software duplication

  19. IV. Criminal Activity Corporate Espionage Increasing Threat

  20. IV. Criminal Activity Sabotage 25% of all crime committed 25% 75%

  21. V. Preventative Measures Education and Training • A Logical First Step

  22. V. Preventative Measures Education and Training 10 Suggestions from Ernst and Young: • Confidentiality Statements • Regular Back-Ups • Policies and Procedures • Control Intranet Access. • Boot-level Passwords

  23. V. Preventative Measures Education and Training 10 Suggestions from E & Y (continued): • Control Internet Access • Restrict Use of Internet • Classify Data • Secure All Computers • Require file-level Passwords

  24. V. Preventative Measures Software • A Variety to Choose From • Positive Results • Indianapolis Power & Light case study

  25. V. Preventative Measures Legal Ramifications • A Better Prepared Law Enforcement • New Laws With Harsher Penalties

More Related