1 / 22

SIXTEEN

SIXTEEN. Computer Crime . LEARNING OBJECTIVES. Outline the types of crimes in which computer is the target Discuss computers as an instrumentality of the crime Describe computers as incidental to the crime Explain crimes associated with the prevalence of computers

kamella
Download Presentation

SIXTEEN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SIXTEEN Computer Crime

  2. LEARNING OBJECTIVES • Outline the types of crimes in which computer is the target • Discuss computers as an instrumentality of the crime • Describe computers as incidental to the crime • Explain crimes associated with the prevalence of computers • Understand the tools that computer criminals use to commit crime • Discuss debates regarding privacy issues concerning the regulation of the Internet • Outline profiles of computer crime suspects • Explain techniques for investigating computer crime • Assess methods to prevent computer crimes 16-1

  3. COMPUTER ABUSE • Any intentional act involving knowledge of computer use or technology in which the perpetrator could have made a gain and the victim could have experienced a loss; includes acts that may not be covered by criminal laws 16-2

  4. COMPUTER CRIME • Any illegal act in which knowledge of computer technology is used to commit the offense 16-3

  5. TYPOLOGIES OF COMPUTER CRIME • The crimes include the denial of expected service or the alteration of data • Computer Manipulation Crimes • Data Alteration or Denial • Network Intrusion and Theft of Data • Denial of Service • Computer Vandalism 16-4

  6. THE COMPUTER AS AN INSTRUMENTALITY OF THE CRIME • Theft • Much information stored in a computer can have value to the owner • Theft of Services • The use of these proprietary services without payment is theft • Fraud • Fraud using a computer exploits the trust, guaranteed by law, in a business transaction • Threat and Harassment • The U.S. Department of Justice (DOJ) maintains a Web site that details a range of threatening behaviors conducted on the internet 16-5

  7. COMMON INTERNET SCAMS (Source: Dallas Morning News, Feb. 16, 1998, P. 2d.) 16-6

  8. COMPUTERS AS INCIDENTAL TO THE CRIME • In this category the computer does not conduct the illegal transaction, it simply facilitates it. Examples include: • Money Laundering • Criminal Enterprise • Child Pornography • Pedophilia and Sexual Assault 16-7

  9. CRIMES ASSOCIATED WITH THE PREVALENCE OF COMPUTERS • Intellectual Property Violations • Misuse of Telephone Systems • Component Theft and Counterfeiting • Identity Theft • Corporate Crime 16-8

  10. 4.5 4.0 1999 3.5 2000 3.0 2.5 2.0 Dollar losses by region (Billions) 1.5 1.0 0.5 0 Middle Eastern Latin Asia/Pacific Western North East/Africa Europe America Europe America COSTS OF SOFTWARE PIRACY • The Business Software Alliance (BSA): • is the principal software industry anti-piracy resource • it estimates losses to piracy in the U.S. alone as 2.5 million dollars • it estimates world-wide losses at 11.7 million dollars (Source: International Planning and Research Corporation, Sixth Annual BSA Global Software Piracy Study (Washington, DC: Business Software Alliance, May 2001): retrieved from www.bsa.org/resources/2001-05-21.55pdf, Aug. 30, 2001.) 16-9

  11. CLONED CELLULAR PONE • The use of cloned cellular phones is popular among criminals • Drug users find cloned phones very useful © Thomas Brummett/Photodisc) 16-10

  12. TOOLS USED BY COMPUTER CRIMINALS TO COMMIT CRIMES • Discovery Tools • Most network intrusions attack targets of opportunity • Cryptoanalysis Tools • Bruce Schneier defines cryptanalysis as the art and science of accessing secured information without conventional means • Exploits • Exploits are a generic class of programs that are written to take advantage of a security hold 16-11(a)

  13. TOOLS USED BY COMPUTER CRIMINALS TO COMMIT CRIMES (Cont’d) • Attack Codes • Attack code is malicious software intended to impair or destroy the function of another computer or network resource • Delivery Vehicles • Delivery vehicles provide computer criminals with a method to deliver their attack software 16-11(b)

  14. TROJAN HORSE • Any computer program that is altered or designed to perform an unwanted or malicious function while appearing to perform a routine or benign function 16-12

  15. VIRUSES AND WORMS • A virus is a malicious program that is secretly inserted into normal software or a computer's active memory and runs when the host runs; causes effects ranging from annoying messages and deletion of data to interference with the computer's operation • A worm is a malicious program that attacks a computer system directly, rather than infecting a host program; spreads rapidly through the internet or e-mail 16-13

  16. HOW VIRUSES ARE SPREAD • Virus programs are: • created by a malicious programmer • are hidden within another “harmless” program • destructive to both software and data (Source: Houston Chronicle, Aug. 8, 1988, p. 88; modified, 1998.) 16-14

  17. PRIVACY ISSUES AND REGULATION OF THE INTERNET • One side of the debate focuses on the vast amount of pornographic material available through the internet • Proponents for regulation say the web should be treated like any other medium • Opponents of regulation say this would involve limiting free speech and violate the First Amendment • The debate is ongoing and unresolved to date 16-15

  18. PROFILES OF COMPUTER CRIMINALS • The most likely suspects in insider computer crime are programmers and system operators. • One study of computer criminals within government found: • They were considered good employees • Their median age was 33 16-16(a)

  19. PROFILES OF COMPUTER CRIMINALS (Cont’d) • Seventy-five percent had some college education • They had been with their respective agencies five years • Seventy-five percent had been promoted • Two-thirds had above average performance ratings • One quarter had received performance awards 16-16(b)

  20. INVESTIGATING COMPUTER CRIME • Crime Scene Techniques • Frequently, computer crime evidence will be seized by the execution of a search warrant • This warrant should include information about the computer, data storage devices and any peripherals that may be of concern to investigators, such as scanners • Digital Forensic Analysis • Digital forensic analysis is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media 16-17

  21. PREVENTING COMPUTER CRIME • Protecting information, largely by making it inaccessible to unauthorized users, is a key element of preventing computer crimes • Back-Ups and Redundant File Storage • Backups are the single most important security measure a company or individual can take • Firewalls • A firewall is a device or software that acts as a checkpoint between a network or stand-alone computer and the Internet 16-18(a)

  22. PREVENTING COMPUTER CRIME • Encryption • Encryption is a technique of securing data by scrambling it into nonsense • Password Discipline • The single greatest problem in computer security is password protection 16-18(b)

More Related