12
Computer Crime Computer Crime and and Identity Theft Identity Theft Abe Orabi Tom Ballaro Abe Orabi Tom Ballaro Tim Williams Tim Williams

Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams

Embed Size (px)

Citation preview

Computer CrimeComputer Crimeandand

Identity TheftIdentity Theft

Abe Orabi Tom Ballaro Tim WilliamsAbe Orabi Tom Ballaro Tim Williams

What is Computer Crime?What is Computer Crime?

Using computer technology to maliciously Using computer technology to maliciously affect othersaffect others

What’s At Risk:What’s At Risk:- Intellectual Property- Intellectual Property- Personal Information- Personal Information- Organizational Information- Organizational Information- National and Global Security- National and Global Security

TechniquesTechniques Scavenging:Scavenging: for stray data or garbage for clues that for stray data or garbage for clues that

might unlock the secrets of a system might unlock the secrets of a system Zapping:Zapping: which means penetrating a computer by which means penetrating a computer by

unlocking the master key to its program and then unlocking the master key to its program and then destroying it by activating its own emergency program destroying it by activating its own emergency program

Worms or worm programs:Worms or worm programs: entail the deletion of entail the deletion of portions of a computer's memory, thus creating a hole of portions of a computer's memory, thus creating a hole of missing information missing information

Time bombs or Logic bombs:Time bombs or Logic bombs: which involve the which involve the insertion of routines that can be triggered later by the insertion of routines that can be triggered later by the computer's clock or a combination of events. When the computer's clock or a combination of events. When the bomb goes off, the entire system, perhaps worth bomb goes off, the entire system, perhaps worth millions, will crash millions, will crash

Viruses:Viruses: are self-replicating programs which can have a are self-replicating programs which can have a similar effect to Time or Logic bombs similar effect to Time or Logic bombs

Forms Of Computer CrimeForms Of Computer Crime

Theft of MoneyTheft of Money-The transfer of payments to the wrong -The transfer of payments to the wrong

accounts accounts Theft of Personal Information:Theft of Personal Information:

- Stealing ones information through use of - Stealing ones information through use of computer technologycomputer technology

Theft of GoodsTheft of Goods - By their diversion to the wrong destination - By their diversion to the wrong destination

Theft of Computer Time:Theft of Computer Time:- Use of an employers computer resources - Use of an employers computer resources

for personal work for personal work

Who are the criminals?Who are the criminals?

25%

24%

31%20%

Managers/Supervisors

Computer Staff

People with LittleComputer Skill

Other

What is Identity Theft?What is Identity Theft?

The criminal act of using stolen The criminal act of using stolen information about a person to assume that information about a person to assume that person’s identityperson’s identity

HistoryHistory

Through the creation of online databases,Through the creation of online databases,

businesses, and online networks, in thebusinesses, and online networks, in the

past 20 years, it past 20 years, it

has become easier has become easier

to commit identity to commit identity

theft through the theft through the

use of computer crimes.use of computer crimes.

Ways to Commit Identity TheftWays to Commit Identity Theft

Computer as a Tool:Computer as a Tool:

Hacking into databases:Hacking into databases:- Social Security Numbers- Social Security Numbers

- Credit Card Information- Credit Card Information

- License Information- License Information

Ways to Commit Identity TheftWays to Commit Identity Theft

Computer as an Object:Computer as an Object:

Internet Fraud:Internet Fraud:

- Applying for Credit Cards- Applying for Credit Cards

- Buying goods - Buying goods

- Money Transfers- Money Transfers

Ways to Prevent Identity TheftWays to Prevent Identity Theft

Computer ProtectionComputer Protection

- Passwords- Passwords

- Firewalls- Firewalls

- Data Encryption- Data Encryption Personal ProtectionPersonal Protection

- Keep a watchful eye on bank - Keep a watchful eye on bank accounts and credit statementsaccounts and credit statements

I am a Victim, What Should I do?I am a Victim, What Should I do?

Close the accounts you know or you think Close the accounts you know or you think may have been compromisedmay have been compromised

File a report with the state or local policeFile a report with the state or local police

File a complaint with the FTCFile a complaint with the FTC

Any Questions?Any Questions?