7
ELECTRONIC CRIME’S EFFECT ON DATA SECURITY BY JIM WOODARD TEXAS TECH UNIVERSITY

Electronic crime’s effect on data security

  • Upload
    manjit

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

Electronic crime’s effect on data security. By Jim Woodard Texas Tech University. Intro. The purpose of this literature review is to examine the effect that various electronic crimes have on data security in terms of verification systems, complex verification systems, and legislation. . - PowerPoint PPT Presentation

Citation preview

Page 1: Electronic crime’s effect on data security

ELECTRONIC CRIME’S EFFECT ON DATA SECURITY

BY JIM WOODARDTEXAS TECH UNIVERSITY

Page 2: Electronic crime’s effect on data security

INTRO

• THE PURPOSE OF THIS LITERATURE REVIEW IS TO EXAMINE THE EFFECT THAT VARIOUS ELECTRONIC CRIMES HAVE ON DATA SECURITY IN TERMS OF VERIFICATION SYSTEMS, COMPLEX VERIFICATION SYSTEMS, AND LEGISLATION.

Page 3: Electronic crime’s effect on data security

SIMPLE VERIFICATION SYSTEMS

• CURRENT VERIFICATION TECHNIQUES THAT ARE USED BY BUSINESSES AREN’T ENOUGH TO RELIABLY PROTECT THEIR CUSTOMERS.

• OFTEN SIMPLE SYSTEMS CAN BE INACCURATE ON OCCASION.

Page 4: Electronic crime’s effect on data security

COMPLEX VERIFICATION SYSTEMS

• COMBINATION OF SIMPLE VERIFICATION TECHNIQUES LEADS TO STRONGER INTEGRITY WITHIN THE SYSTEM ITSELF.

• BIO-VERIFICATION ARE MUCH MORE RELIABLE THAN PASSWORD COMBINATION OR PIN VERIFICATION SYSTEMS.

Page 5: Electronic crime’s effect on data security

LEGISLATION AND REGULATION

• GOVERNMENTS ARE SLOW TO ACT ON CYBER CRIMES.• MORE TIME IS NEEDED IN ORDER TO VERIFY WHETHER OR NOT THE

LEGISLATION IS ACTUALLY EFFECTIVE.

Page 6: Electronic crime’s effect on data security

CONCLUSION

• MORE RESEARCH IS NEEDED ON COMPLEX VERIFICATION SYSTEMS AND LEGISLATION IN ORDER TO DETERMINE THE EFFECTIVENESS OF EACH AGAINST MODERN DAY CYBER-CRIMES.

Page 7: Electronic crime’s effect on data security

WORKS • BILEVIČIENĖ, TATJANA, AND EGLĖ BILEVIČIŪTĖ. "DYNAMICS OF CRIMES AGAINST THE SECURITY OF ELECTRONIC DATA AND

INFORMATION SYSTEMS, AND ITS INFLUENCE ON THE DEVELOPMENT OF ELECTRONIC BUSINESS IN LITHUANIA." JURISPRUDENCIJA 18.2 (2011): 689-702. ACADEMIC SEARCH COMPLETE. WEB. 24 JUNE 2014.

• COLE, SIMON A. "MORE THAN ZERO: ACCOUNTING FOR ERROR IN LATENT FINGERPRINT IDENTIFICATION." JOURNAL OF CRIMINAL LAW AND CRIMINOLOGY (2005): 985-1078. WEB. 24 JUNE 2014.

 • JAIN, ANIL, LIN HONG, AND SHARATH PANKANTI. "BIOMETRIC IDENTIFICATION."COMMUNICATIONS OF THE ACM 43.2 (2000): 90-

98. WEB. 24 JUNE 2014. • LINDUP, KEN. "TECHNOLOGY AND BANKING: LESSONS FROM THE PAST."DIGITAL EVIDENCE & ELECTRONIC SIGNATURE LAW

REVIEW 9.(2012): 91-94. ACADEMIC SEARCH COMPLETE. WEB. 24 JUNE 2014. • RATHA, NALINI K., JONATHAN H. CONNELL, AND RUUD M. BOLLE. "ENHANCING SECURITY AND PRIVACY IN BIOMETRICS-BASED

AUTHENTICATION SYSTEMS." IBM SYSTEMS JOURNAL40.3 (2001): 614-634. WEB. 24 JUNE 2014. • SINROD, ERIC J., AND WILLIAM P. REILLY. "CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER

CRIME LAWS." SANTA CLARA COMPUTER & HIGH TECH. LJ 16 (2000): 177. WEB. 24 JUNE 2014. • YANG, SHENGLIN, AND INGRID VERBAUWHEDE. "AUTOMATIC SECURE FINGERPRINT VERIFICATION SYSTEM BASED ON FUZZY

VAULT SCHEME." ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2005. PROCEEDINGS.(ICASSP'05). IEEE INTERNATIONAL CONFERENCE ON. VOL. 5. IEEE, 2005. WEB. 24 JUNE 2014.

 • ZULHUNDA, SONNY, IDA MADIEHA, AND ABDUL GHANI AZMI. "SECURITY SAFEGUARDS ON E-PAYMENT SYSTEMS IN MALAYSIA:

ANALYSIS ON THE PAYMENT SYSTEMS ACT 2003." J. INT'L COM. L. & TECH. 6 (2011): 187. WEB. 24 JUNE 2014.