140 likes | 334 Views
Computer Crimes. Chapter 9. Definition. Illegal act that involves a computer system or computer-related system Telephone, microwave, satellite telecommunications system That connect one or more computers or computer-related systems. Three Categories. Natural or inadvertent attack
E N D
Computer Crimes Chapter 9
Definition • Illegal act that involves a computer system or computer-related system • Telephone, microwave, satellite telecommunications system • That connect one or more computers or computer-related systems
Three Categories • Natural or inadvertent attack • Human blunders, errors and omissions • Intentional trheats
Two Aspects of Cyber Crime • Virus • Hacking
Two Types of Attacks • Penetration • Insider threats • Hackers • Criminal Groups • Hactivism • Denial of Service Attacks • Inside • Outside
Motivation of Attacks • Business and Industrial Espionage • Joke/Hoax • Political Activism • Political and Military Espionage • Terrorism/Extortion • Vendetta
Questions Are we prepared for a cyber attack? What are the consequences?
Congressional Hearing Intelligence and Security in Cyberspace Comparison make of the efforts of the government to a “toddler soccer game were everyone just runs around trying to kick the ball somewhere
Reasons for No Information • Lack of reporting requirements • Public sector – fear of market reaction to news • Lack of enforcement of existing reporting mechanisms • Detection of insider attacks • Lack of security agencies or trained security agencies
Reason for Growth in Cyber Crimes • Rapid technology growth • Easy availability of hacker tools • Anonymity • Cut-and-past programming technology • Communication speed • High degree of internetworking • Increasing dependency on computers
How Much Does It Cost?Who Knows? • Difficult to quantify the number of attacks • No baseline • Not reporting insider attacks • Lack of cooperation between emergency and computer crime reporting centers Continued
How Much Does It Cost?Who Knows? • Unpredictable types of attacks • Virus mutation • Not enough trained system administrators • Primitive monitoring technology
Social and Ethical Consequences • Psychological effects – hate and bigotry • Acceptance of the norm and resulting moral decay • Loss of privacy • Trust • Others?