Chapter 9 Definition Illegal act that involves a computer system or computerrelated system Telephone microwave satellite telecommunications system That connect one or more computers or computerrelated systems ID: 252131
Download Presentation The PPT/PDF document "Computer Crimes" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Computer Crimes
Chapter 9Slide2
Definition
Illegal act that involves a computer system or computer-related system
Telephone, microwave, satellite telecommunications system
That connect one or more computers or computer-related systemsSlide3
Three Categories
Natural or inadvertent attack
Human blunders, errors and omissions
Intentional trheatsSlide4
Two Aspects of Cyber Crime
Virus
HackingSlide5
Two Types of Attacks
Penetration
Insider threats
Hackers
Criminal Groups
Hactivism
Denial of Service Attacks
Inside
OutsideSlide6
Motivation of Attacks
Business and Industrial Espionage
Joke/Hoax
Political Activism
Political and Military Espionage
Terrorism/Extortion
VendettaSlide7
Questions
Are we prepared for a cyber attack?
What are the consequences?Slide8
Congressional Hearing
Intelligence and Security in Cyberspace
Comparison make of the efforts of the government to a “toddler soccer game were everyone just runs around trying to kick the ball somewhereSlide9
Reasons for No Information
Lack of reporting requirements
Public sector – fear of market reaction to news
Lack of enforcement of existing reporting mechanisms
Detection of insider attacks
Lack of security agencies or trained security agenciesSlide10
Reason for Growth in Cyber Crimes
Rapid technology growth
Easy availability of hacker tools
Anonymity
Cut-and-past programming technology
Communication speed
High degree of internetworking
Increasing dependency on computersSlide11
How Much Does It Cost?
Who Knows?
Difficult to quantify the number of attacks
No baseline
Not reporting insider attacks
Lack of cooperation between emergency and computer crime reporting centers
Continued Slide12
How Much Does It Cost?
Who Knows?
Unpredictable types of attacks
Virus mutation
Not enough trained system administrators
Primitive monitoring technologySlide13
Social and Ethical Consequences
Psychological effects – hate and bigotry
Acceptance of the norm and resulting moral decay
Loss of privacy
Trust
Others?