1 / 6

Cyber Crime

Cyber Crime. Statistics. The 2000 Computer Security Institute/FBI Computer Crime and Security Survey Ninety percent of the study's 585 respondents reported computer security breaches within the last twelve months

saburo
Download Presentation

Cyber Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crime

  2. Statistics • The 2000 Computer Security Institute/FBI Computer Crime and Security Survey • Ninety percent of the study's 585 respondents reported computer security breaches within the last twelve months • Financial losses for the 273 organizations that could quantify them adds up to $265,586,240 http://www.cybercitizenship.org/ethics/whitepaper.html

  3. Computer Usage by Children • 5 to 17 year olds have extensive access to computers • Among households with computer access • 60% of children ages 3-5 years are actively accessing the computer • 84% of ages 6-11 use the computer • 89% of ages 12-17 http://www.cybercitizenship.org/ethics/whitepaper.html

  4. What Can We Do • Have a security policy • Conduct risk management • Do vulnerability assessment • Use strong cryptographic algorithms • Perform penetration testing • Conduct regular audits • Use proven security protocols • Develop legislation • Practice self-regulation • Perform mass education

  5. Proven Security Protocols • Authentication • Something you know • Something you have • Something you are • Access Control

  6. Ten Commandments of Computer Ethics • Thou shalt not use a computer to harm other people. • Thou shalt not interfere with other people's computer work. • Thou shalt not snoop around in other people's files. • Thou shalt not use a computer to steal. • Thou shalt not use a computer to bear false witness. • Thou shalt not use or copy software for which you have not paid. • Thou shalt not use other people's computer resources without authorization. • Thou shalt not appropriate other people's intellectual output. • Thou shalt think about the social consequences of the program you write. • Thou shalt use a computer in ways that show consideration and respect. http://www.cybercitizenship.org/ethics/whitepaper.html

More Related