1 / 11

The Internet Crime

The Internet Crime. Kathi Subramaniyam CS-403. Overview. Internet crime Types of Crime Security features Future. Internet crime. Today’s world of computer crime ,”Hacker”is a well known word.

sdubose
Download Presentation

The Internet Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Internet Crime Kathi Subramaniyam CS-403

  2. Overview • Internet crime • Types of Crime • Security features • Future

  3. Internet crime • Today’s world of computer crime ,”Hacker”is a well known word. • Hackers are people who try to get access to computer system illegally,usually from a personal computer,via a data communication network. • Some hackers invade websites with taunting boasts and their own private jokes and victims feel violated.

  4. Types of crime • The trojan horse: refers to illegal instructions placed in the middle of a legitimate program. • Zapping: able to bypass any security system. • Bomb: A bomb causes a program to trigger damage under certain conditions.

  5. Types of crime continued • Data diddling: Which means changing data before or as it enter the system. • Piggy backing: When an illicit user “rides” into the system on the back of another user.

  6. Types of crime continued • Salami:Refers to small slices of money that may be subtracted from large financial system undetected. • Scavenging: The scavengers search the trash cans and dumpsters for printouts that contain information about credit card numbers account number.

  7. Security Features • Forensics: Computer forensic means the uncovering of computer stored information suitable for use in illegal procedures.Forensic experts work on tracing missing inventory or a court ordered subpoena for E-mail messages containing sexual harassment language

  8. Security Features continued • Security of software data and personal computers. • Safeguarding the system against such threats as natural disaster, fire, accident, vandalism, theft, destruction of data and hackers. • A person should have something recognizable to the computer and which will give him or her access to the computer room or locked terminal.(badge, plastic card, key, token) • Now software can verify both scanned and online signatures.

  9. Security Features continued • Bio-metric security systems are coming on . The science measures an individual’s body characteristics, when you simply insert your finger into an identification machine. Some systems use the characteristics of the entire hand. • Another way is the identification of the voice pattern or sometimes the identification is based on the retina of the eye which is harder to duplicate than a voice pattern.

  10. The Future • Employee damage will increase as the computer literacy increases. • Financial crimes will increase. • The virus will bring down the internet without any warning, unless any changes in the anti virus protection is made. Worse viruses can be expected. • The use of unix is not enough to secure the internet, We need to have stronger authentication and end to end encryption.

  11. The Future continued • People will begin to feel that internet is not reliable. • Criminals will continue to grow and smart criminals will remain hidden. • The future of challenging automated crimes wold be packaged in a single computer program we have to use high level automated security.

More Related