250 likes | 404 Views
COMPUTER CRIME. An Overview. Agenda. Background and History Potential Criminals Ethics Survey Criminal Activity Preventative Measures. I. Background & History. Evolution of the Information Age. Growth Projections Internet The Inevitable. I. Background & History.
E N D
COMPUTER CRIME An Overview
Agenda • Background and History • Potential Criminals • Ethics Survey • Criminal Activity • Preventative Measures
I. Background & History Evolution of the Information Age • Growth Projections • Internet • The Inevitable
I. Background & History Escalation and Frequency 5-year increase
I. Background & History Escalation and Frequency FBI Computer Crimes Division Reports: • 15 security breaches every day • 75% annual increase in recent years
I. Background & History Escalation and Frequency Department of Defense Study 1072 7470 7860 390 # of successful system attacks (8932 attempts) # of detections (out of 7860 successful attempts)
I. Background & History Intrusion Costs Ernst and Young Survey: • More than 1/2 incurred a loss • Each loss exceeded $100,000 • Seventeen losses exceeded $1,000,000
I. Background & History Case Study Hacker Penetrates Citibank System
I. Background & History Case Study Hacker Penetrates Citibank System • The criminals • The crime • The result
II. Potential Criminals Employees/Ex-employees % of crimes committed • Users • Analysts • Programmers 20% 80%
III. Ethics Survey Case Study # Agreeing % Agreeing 1. A person is justified 11 5% in making copies of employers software. 2. I would copy software 75 41% (illegally) for my use. 3. A user is justified in 6 3% accessing / using the services ( of another company’s computer ) to his advantage. # Agreeing % Agreeing 1. A person is justified 11 5% in making copies of employers software. 2. I would copy software 75 41% (illegally) for my use. 3. A user is justified in 6 3% accessing / using the services ( of another company’s computer ) to his advantage.
III. Ethics Survey Case Study # Agreeing % Agreeing 4. I would crack a com- 15 7% puter if I knew how. 5. There is nothing wrong 21 10% in writing a virus program to output the message “Have a nice day.” 6. Management can be so 15 7% unfair at times that a person can be justified in erasing files.
III. Ethics Survey Case Study # Agreeing % Agreeing 7. I would adjust a 15 7% system to avoid an account service charge for an overdrawn checking account. 8. There is nothing wrong 13 6% with cracking another company’s computer to identify other customers to sell to.
IV. Criminal Activity Hacking The technical-minded crime
IV. Criminal Activity Viruses Nondestructive or Malevolent
IV. Criminal Activity Trojan Horse • History • Vehicle for viruses and logic bombs
IV. Criminal Activity Fraud and Abuse Case Studies • Race Track Trifecta • Huntsville Prison • Robin Hood of Northwest
IV. Criminal Activity Theft Unauthorized software duplication
IV. Criminal Activity Corporate Espionage Increasing Threat
IV. Criminal Activity Sabotage 25% of all crime committed 25% 75%
V. Preventative Measures Education and Training • A Logical First Step
V. Preventative Measures Education and Training 10 Suggestions from Ernst and Young: • Confidentiality Statements • Regular Back-Ups • Policies and Procedures • Control Intranet Access. • Boot-level Passwords
V. Preventative Measures Education and Training 10 Suggestions from E & Y (continued): • Control Internet Access • Restrict Use of Internet • Classify Data • Secure All Computers • Require file-level Passwords
V. Preventative Measures Software • A Variety to Choose From • Positive Results • Indianapolis Power & Light case study
V. Preventative Measures Legal Ramifications • A Better Prepared Law Enforcement • New Laws With Harsher Penalties