Professional Documents
Culture Documents
Neolithic Era
Accountants could steal more than mobsters Included cash heavy business to conceal proceeds
Geek-olithic Era
Computers or network of computers involved
Computer as a Subject
Computer is used to commit crime
Computer as a Tool
Computer is integral to the act
Computer as a Symbol
Computer adds credibility or is used to deceive
Computer Crime
Hardware, software or data is destroyed or manipulated due to acts which are not intended Computer assisted crimes
Economic Loss
Responding to illegal acts Conducting a damage assessment Restoring data or program to original condition Consequential damages occurred
Special Loss
An actual or potential effect on medical care Physical injury to a person Threat to public health or safety Damage to a computer related to the administration of justice, national defense or national security
Computer Viruses
Types of Computer Viruses Virus Carriers and Indicators
Insider Threats
Computer crime from employees inside an organization
Opportunity to commit fraud Aware of holes in the system
Less stringent supervisory controls over IS personnel Computer fraudster characteristics are similar to traditional fraudster
Intelligent Hard working Minimal absences Bored with the routine Egotistical
Computer Hacking
Seek unauthorized access to computer systems Incorporate unsuspecting computer owners Gain access by generating password
Social Engineering
Simple deception to gain access to information Pose as new worker to gain information Retrieve documents from trash
Computer Viruses
Attack Software Hidden computer programs that shut or slow down system Can ruin data and destroy computer Slow down can overload e-mail networks
Antivirus Software
Detect computer viruses and malware Traditional Scanners
Look for known viruses Check recognizable patterns Limited usefulness
Heuristic Scanners
Look for unknown viruses Inspect executable files
Audit trail of infection Determine source of virus Protection policies Countermeasures Track costs / damages
Internet Fraud
Electronic Commerce Typical Internet Schemes
Traditional Frauds Adapted for the Computer and Internet Additional Threats and Abuses of the Computer and Internet
E-gold
Electronic currency
Backed by gold bullion in allocated storage Global currency