Download
computer crimes n.
Skip this Video
Loading SlideShow in 5 Seconds..
Computer Crimes PowerPoint Presentation
Download Presentation
Computer Crimes

Computer Crimes

167 Vues Download Presentation
Télécharger la présentation

Computer Crimes

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Computer Crimes Chapter 9

  2. Definition • Illegal act that involves a computer system or computer-related system • Telephone, microwave, satellite telecommunications system • That connect one or more computers or computer-related systems

  3. Three Categories • Natural or inadvertent attack • Human blunders, errors and omissions • Intentional trheats

  4. Two Aspects of Cyber Crime • Virus • Hacking

  5. Two Types of Attacks • Penetration • Insider threats • Hackers • Criminal Groups • Hactivism • Denial of Service Attacks • Inside • Outside

  6. Motivation of Attacks • Business and Industrial Espionage • Joke/Hoax • Political Activism • Political and Military Espionage • Terrorism/Extortion • Vendetta

  7. Questions Are we prepared for a cyber attack? What are the consequences?

  8. Congressional Hearing Intelligence and Security in Cyberspace Comparison make of the efforts of the government to a “toddler soccer game were everyone just runs around trying to kick the ball somewhere

  9. Reasons for No Information • Lack of reporting requirements • Public sector – fear of market reaction to news • Lack of enforcement of existing reporting mechanisms • Detection of insider attacks • Lack of security agencies or trained security agencies

  10. Reason for Growth in Cyber Crimes • Rapid technology growth • Easy availability of hacker tools • Anonymity • Cut-and-past programming technology • Communication speed • High degree of internetworking • Increasing dependency on computers

  11. How Much Does It Cost?Who Knows? • Difficult to quantify the number of attacks • No baseline • Not reporting insider attacks • Lack of cooperation between emergency and computer crime reporting centers Continued

  12. How Much Does It Cost?Who Knows? • Unpredictable types of attacks • Virus mutation • Not enough trained system administrators • Primitive monitoring technology

  13. Social and Ethical Consequences • Psychological effects – hate and bigotry • Acceptance of the norm and resulting moral decay • Loss of privacy • Trust • Others?