1 / 24

Computer Crime, Ethics, Privacy

Computer Crime, Ethics, Privacy. Computer Crime. What is computer crime? Why is it important to know this?. Computer Crime & Abuse:. What’s the Difference between the 2?. Legislation. The Computer Fraud and Abuse Act of 1986 Fair Credit Reporting Act of 1970

kalila
Download Presentation

Computer Crime, Ethics, Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crime, Ethics, Privacy

  2. Computer Crime • What is computer crime? • Why is it important to know this?

  3. Computer Crime & Abuse: • What’s the Difference between the 2?

  4. Legislation • The Computer Fraud and Abuse Act of 1986 • Fair Credit Reporting Act of 1970 • Freedom of Information Act of 1970 • Federal Privacy Act of 1974 • Small Business Computer Security and Education Act of 1984 • Computer Fraud and Abuse Act of 1986 • Computer Fraud and Abuse Act (1996 amendment) • Computer Security Act of 1987 • USA Patriot Act of 2001 • Cyber Security Enhancement Act of 2002 • CAN-SPAM Act of 2003

  5. Kinds of Computer Crime • Commit a felony • Software • Stealing money • Computer hardware • Information • Access • Extortion

  6. Computer Fraud • What is Computer fraud? • What is Economic espionage?

  7. Computer-Crime Statistics • Sometimes we know what we know • Sometimes we know what we don’t know • But . . . . . it’s what we don’t know that we don’t know that are the most difficult.

  8. The Growth of Computer Crime • Why? • Resources • Instructions • computer controls

  9. Three Representative Computer Crimes Cases • Compromising Valuable Information Computer Hacking • Denial of service

  10. The TRW Credit Data Case • information computer crime • computerized credit data. • Two key issues

  11. The Kevin D. Mitnick Case • Hackers • Shoulder surfing • Password controls • Social engineering • Lock-out systems • Dial-back systems

  12. Robert T. Morris and the Internet Virus • Created one of the world’s most famous compute viruses. • Became first person to be indicted under the Computer Fraud and Abuse Act of 1986. • This case illustrates vulnerability of networks to virus infections.

  13. Computer Viruses • What are they? • Boot-sector viruses • Worm viruses

  14. Robert T. Morris and the Internet Virus Case • Trojan Horse programs • Logic Bomb programs • applet

  15. Methods for Thwarting Computer Viruses: Anti-Virus Software • What does anti- virus software do? • Scans • identifies • cleanse

  16. Drawbacks of Anti-Virus Software Programs • Really????

  17. Anti-Virus Procedural Controls • Reputable • Copying • Download • Email • Backup files

  18. Organizational Safeguards Against Computer Viruses • Education • Policies • Passwords • Filters • Disaster recovery plan.

  19. Methods for Thwarting Computer Abuse • Top management • Education • Security inventory • Controls • Computer criminals

  20. Methods for Thwarting Computer Abuse • Symptoms • Irregularities • Weaknesses • Changes in an employee • Anomalies • Employ forensic accountants

  21. Computers and Ethical Behavior • What is meant by “ethics”? • What is ethical behavior?

  22. Ethical Issues • Honesty • Protecting Computer Systems • Protecting Confidential Information • Social Responsibility • Rights of Privacy • Acceptable Use of Computer Hardware and Software.

  23. How Can Organizations Encourage Ethical Behavior ?

  24. Computers and Privacy Issues • Company policies with respect to privacy • Privacy policy • Disposal of computers • Online privacy seals

More Related