Computer crimes
This presentation is the property of its rightful owner.
Sponsored Links
1 / 22

Computer Crimes PowerPoint PPT Presentation


  • 78 Views
  • Uploaded on
  • Presentation posted in: General

Computer Crimes . Wikipedia. World-wide data base of information that can be edited by anyone Uses programs to monitor malicious behavior Effective? Ex: 2008 Presidential Election. What Is Crime?. It is define: instance of negligence injurious to the public welfare or morals

Download Presentation

Computer Crimes

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Computer crimes

Computer Crimes


Wikipedia

Wikipedia

  • World-wide data base of information that can be edited by anyone

  • Uses programs to monitor malicious behavior

    • Effective?

  • Ex: 2008 Presidential Election


What is crime

What Is Crime?

  • It is define:

    • instance of negligence

    • injurious to the public welfare or morals

    • Ex: Murder, Stealing, Breaking and Entering


What would you do

What Would You Do?

  • Example: You are sitting in your classroom when…

    • You see a man outside mugging an old lady

      AND

    • You see a random person in the corner smugly typing on his computer

Who would you go to first and why?


How does crime interact with technology

How Does Crime Interact with Technology?

  • Also called “Cyber Crimes”

  • Defined as:

    • the use of information technology for illegal purposes

    • unauthorized access of a computer system

    • damage, delete or alter the data present in the computer.


Genres of computer crimes

Genres of Computer Crimes

1.) New Versions of old crimes

ex: Theft, Fraud, Stalking, Libel, and Defamation

2.)Crimes that couldn’t exist without computers or are directed at computers

ex: Virus, Denial-of-Service Attack, and Inappropriate Pinging


Which is worse

Which Is Worse?

  • Example: Child Pornography v. Rape

    • Pornography is one of the most frequent computer crime to date

      • Every second - 28,258 Internet users are viewing pornography

    • 3% of college women nationally have experienced rape or attempted rape during the academic year.

      • Ex: A campus with 6,000 coeds will have an average of one rape per day during the school year.


Hacking

Hacking

  • In olden days, considered to be computer enthusiasts who found new things to do with technology

  • Now, refers to those who use computers for illegal actions such as unauthorized access to computer systems and stealing proprietary software.


Examples of hacking

Examples of Hacking

Robert T. Morris Jr.- Created the most invasive computer worm that spread across the internet. Attempted to show security flaws, but had its own flaw which enabled people from stopping it. Charged with violating Federal Computer Fraud and Abuse Act and suspended from Cornell.


Is hacking ever good

Is Hacking Ever Good?

  • Ex: Wikileaks

  • “The founder of whistleblowing website Wikileaks has defended the release of almost 400,000 classified US documents about the war in Iraq.” (BBC News)

  • Video: http://www.bbc.co.uk/news/world-middle-east-11612731


Hacker defense

Hacker Defense

Discussion Topics:

1.) All Information Should be Free

Give me an example of information should not be available

2.) Benificial because it illustrates security problems that can be fixed

Does hacking for the purpose of government security violate either act or rule utilitarianism?


Hacker defense cont

Hacker Defense cont.

3.)Gaining unauthorized access does no harm as long as hackers don’t change anything

Do you believe this is true? Why?

4.)Help keep Big Brother at bay


Sextortion example

Sextortion Example

  • Ex: Isanybodydown.com

    • People send naked pictures in

    • Posted to site with personal information

    • $250 fee to get the info and picture down

    • What would you do if you found your picture on this website?


Sextortion and pornography

Sextortion and Pornography

  • Sexortion is:

    • Sexual exploitation

    • Non-physical forms of coercion sexual favors

  • Pornography is:

    • Explicit portrayal of sexual encounters

    • Although some is legal, most frequented porn is not


Facebook and pornography

Facebook and Pornography

  • Facebook had almost 1 billion users

  • 435 children were trafficked last year in Indonesia alone

  • 40,000-70,000 children were involved in Trafficking. Pornography, and/or Prostitution

  • Is Facebook a computer crime?


What about the children

What About the Children?

  • How do we protect children from something they don’t know about?

  • New research suggest that the young and the old are the most vulnerable and used targets for computer criminals

  • http://www.wishtv.com/dpp/news/local/marion_county/cyber-crime-snapped-teens-photo-while-online


What have you done

What Have You Done?


China and technology

China and Technology

  • Limited use of internet

  • Google and Facebook are banned

    • Considered a crime if used without authorization

  • Are computer crimes a moral or objective and why?


How is this ethical

How is This Ethical?

  • Who is hurt by computer crimes?

    • Fraud, viruses, extortions, identity theft, even Facebook?

  • Ethical Relativism- Does this change dependent on where you are?


Current events

Current Events

  • Ours:

  • Hackers in China and the Times

  • Financial Cyber Attacks

  • SnapChat

  • Yours:


Punishing computer crimes

Punishing Computer Crimes

  • Should someone who steal someone’s identity have the same penalty as someone who goes in and steals from a bank?

  • Is one worse than the other? Why?


Solution to problem

Solution to Problem

Is There A solution?

  • New Laws- what type?

  • Website coverage and instigation- how would we do this?

  • Actually downloading songs from Itunes

  • Buying the movie or renting it- How would that affect your recreational life?


  • Login