Professional Documents
Culture Documents
Topics of Discussion
y Introduction y What are Computer Crimes and Ethics y Types of Computer Crime y Information Systems and Technology
Vulnerabilities y Ways to Manage the Risks Associated with Vulnerabilities y Can we trust Computers?
others and how the information can be used y Issues in information accessibility y Carnivore: software application designed to be connected to Internet Service Providers computers and eavesdrops on all communications. y Electronic Communications Privacy Act (ECPA): it offered stronger support for voice mail than it did for e-mail. No other laws at federal or state levels protect e-mail privacy y Monitoring e-mail
Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
y Business ethics y Plagiarism y Cybersquatting: registering a domain name and then trying to sell
the name for big bucks to a person, company. Domain names are a scarce resource one of the few scarce resources in cyberspace
Computer Crime
y Computer used to commit a crime
Computer as a target of a crime The commission of illegal acts through the use of a computer or against a computer system.
y Viruses, worms, industrial espionage,
Computer Crime
y Types of computer crime y Data diddling: modifying data y Salami slicing: skimming small amounts of money y Phreaking: making free long distance calls y Cloning: cellular phone fraud using scanners y Carding: stealing credit card numbers online y Piggybacking: stealing credit card numbers by spying y Social engineering: tricking employees to gain access y Dumpster diving: finding private info in garbage cans y Spoofing: stealing passwords through a false login page
Computer Crime
y Who commits computer crime?
SPAM
Spam accounts for 9 out of every 10
emails in the United States. MessageLabs, Inc., an email management and security company based in NewYork.
y Controlling the Assault of Non-Solicited Pornography and Marketing
y Unsolicited commercial email must: y Be labeled y Include Opt-Out instructions y No false headers
Spam is Hostile
Spam can be dangerous
y Never click on the opt-out link! y May take you to hostile web site
where mouse-over downloads an .exe y Tells spammers they found a working address y They wont take you off the list anyway
software and runs when you run something else y Macro in excel, word
y Transmitted through sharing programs
y Worms
y software that uses computer networks
to find security holes to get in to your computer usually in Microsoft OS!! But worm for MAC was recently written
password protect it
not in use
Dont use words found in a dictionary. Remember that password cracking tools exist
regular basis
Conclusion
Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. Security is an illusion as any system can be attacked under the right circumstances. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.
Thank you!