19
Computer Crimes 8 Chapte r

Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Embed Size (px)

Citation preview

Page 1: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Computer CrimesComputer Crimes

88Chapter Chapter

Page 2: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

The act of using a computer to commit an illegal act

Authorized and unauthorized computer access.

Examples-

o Stealing time on company computers

o Breaking into government Web sites

o Stealing credit card information

Definition: Definition:

Page 3: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Stealing or compromising data.

Gaining unauthorized computer access.

Violating data belonging to banks.

Intercepting communications.

Threatening to damage computer systems.

Disseminating (spread) viruses.

Federal and State Laws:Federal and State Laws:

Page 4: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Who commits computer crime?Who commits computer crime?

Page 5: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Computer crimes occur when intruders gain unauthorized access to computer systems.

Cybercrime is crime carried out over the Internet. Cyber law tracks and combats computer related crime. Types of Computer Crime-

1. Identity Theft2. Computer Viruses3. Fraud and Theft4. More Rogue Program5. Forgery6. Blackmail

Computer crime and cybercrimeComputer crime and cybercrime

Page 6: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Intimidate (threaten) governments to advance political or social objectives

Launch computer-based attacks

Seek to cause harm

o Rather than gather information

Many experts believe terrorist groups pose only a limited threat to information systems

Cyber terroristsCyber terrorists

Page 7: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Types of computer crime …

1. Identity theft

Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account.

2. Computer viruses are malicious programs that infect a computer system

causing various problems with its use. a destructive program that disrupts the normal functioning of

computer systems. viruses replicate and attach themselves to programs in the

system.

Page 8: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

How virus infections spread?o Inserting a disk with an infected program and then starting the

program.o Downloading an infected program from the Internet.o Being on a network with an infected computer.o Opening an infected e-mail attachment.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 9: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Type of viruses:

i. File Infectorso Attach themselves to program files.o Spread to other programs on the hard drive.o Are the most common type of virus.

ii. Boot Sector Viruseso Attach themselves to the boot sector of a hard drive.o Execute each time the computer is started.o May lead to the destruction of all data.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 10: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

iii. Macro viruses

o Infect the automatic command capabilities of productivity software.

o Attach themselves to the data files in word processing, spreadsheet, and database programs.

o Spread when the data files are exchanged between users.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 11: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 12: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

3. More Rogue Programs

i. Time Bombs Also called logic bombs A type of Trojan horse that stays dormant (un-active) for a

period of time before activating. Harmless until a certain event or circumstance activates the

program.

ii. Worms Resemble a virus and usually does not destroy files. Spread from one computer to another. Control infected computers. Attack other networked computers.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 13: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

iii. Denial of Service Attack (DoS) Synchronize flooding.

Overload an Internet server with a large number of requests.

iv. Trojan Horses Disguise themselves as useful programs.

Activates without being detected; does not copy itself.

Contain hidden instructions.

May erase data or cause other damage.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 14: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

4. Fraud and Theft

Selling social security numbers.

Memory shaving – taking RAM chips from computers.

Salami Shaving Programmer alters a program to take a small amount of

money out of an account

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 15: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

5. Forgery

Internet data can appear to be coming from one source when its really coming from another.

Forged e-mail and Web pages.

6. Blackmail

Adverse publicity fears.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Types of computer crime …

Page 16: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

1. Hackers

One who gains unauthorized computer access, but without doing damage.

Gain unauthorized access to computer or telecommunications systems

Computer hobbyists

Find weaknesses and loopholes in computer systems

Dr. Mohammad Alamgeer (http://www.az-group.org)

Computer criminals: Computer criminals:

Page 17: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

2. Crackers

One who breaks into computer systems for the purpose of doing damage.

Illegally break into computers for malicious purposes.

Also called black hats .

Obsessed with entering secure computer systems.

Leave calling cards on the systems they enter.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Computer criminals … Computer criminals …

Page 18: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

3. Cyber Gangs

Bring crackers together by way of the Internet and meetings.

4. Virus Authors

Push the boundaries of antivirus software.

Create viruses that are very damaging.

Dr. Mohammad Alamgeer (http://www.az-group.org)

Computer criminals … Computer criminals …

Page 19: Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time

5. Employees

Sabotage their company’s computer system

Create security holes called trap doors

5. Swindlers

Use the Internet to scam money from people

Use scams like rip and tear, pumping and dumping, and bogus goods

Dr. Mohammad Alamgeer (http://www.az-group.org)

Computer criminals … Computer criminals …