260 likes | 468 Views
Computer Crime, Ethics, Privacy. Computer Crime. What is computer crime? Why is it important to know this?. Computer Crime & Abuse:. What’s the Difference between the 2?. Legislation. The Computer Fraud and Abuse Act of 1986 Fair Credit Reporting Act of 1970
E N D
Computer Crime • What is computer crime? • Why is it important to know this?
Computer Crime & Abuse: • What’s the Difference between the 2?
Legislation • The Computer Fraud and Abuse Act of 1986 • Fair Credit Reporting Act of 1970 • Freedom of Information Act of 1970 • Federal Privacy Act of 1974 • Small Business Computer Security and Education Act of 1984 • Computer Fraud and Abuse Act of 1986 • Computer Fraud and Abuse Act (1996 amendment) • Computer Security Act of 1987 • USA Patriot Act of 2001 • Cyber Security Enhancement Act of 2002 • CAN-SPAM Act of 2003
Kinds of Computer Crime • Commit a felony • Software • Stealing money • Computer hardware • Information • Access • Extortion
Computer Fraud • What is Computer fraud? • What is Economic espionage?
Computer-Crime Statistics • Sometimes we know what we know • Sometimes we know what we don’t know • But . . . . . it’s what we don’t know that we don’t know that are the most difficult.
The Growth of Computer Crime • Why? • Resources • Instructions • computer controls
Three Representative Computer Crimes Cases • Compromising Valuable Information Computer Hacking • Denial of service
The TRW Credit Data Case • information computer crime • computerized credit data. • Two key issues
The Kevin D. Mitnick Case • Hackers • Shoulder surfing • Password controls • Social engineering • Lock-out systems • Dial-back systems
Robert T. Morris and the Internet Virus • Created one of the world’s most famous compute viruses. • Became first person to be indicted under the Computer Fraud and Abuse Act of 1986. • This case illustrates vulnerability of networks to virus infections.
Computer Viruses • What are they? • Boot-sector viruses • Worm viruses
Robert T. Morris and the Internet Virus Case • Trojan Horse programs • Logic Bomb programs • applet
Methods for Thwarting Computer Viruses: Anti-Virus Software • What does anti- virus software do? • Scans • identifies • cleanse
Drawbacks of Anti-Virus Software Programs • Really????
Anti-Virus Procedural Controls • Reputable • Copying • Download • Email • Backup files
Organizational Safeguards Against Computer Viruses • Education • Policies • Passwords • Filters • Disaster recovery plan.
Methods for Thwarting Computer Abuse • Top management • Education • Security inventory • Controls • Computer criminals
Methods for Thwarting Computer Abuse • Symptoms • Irregularities • Weaknesses • Changes in an employee • Anomalies • Employ forensic accountants
Computers and Ethical Behavior • What is meant by “ethics”? • What is ethical behavior?
Ethical Issues • Honesty • Protecting Computer Systems • Protecting Confidential Information • Social Responsibility • Rights of Privacy • Acceptable Use of Computer Hardware and Software.
Computers and Privacy Issues • Company policies with respect to privacy • Privacy policy • Disposal of computers • Online privacy seals