1 / 16

Computers and Crime

Computers and Crime. Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft. Computers and Crime.

wiley
Download Presentation

Computers and Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computers and Crime • Breaking and Entering • Eavesdropping • Harassment • Vandalism • Destruction of Private Property • Possession of Stolen Goods • Theft

  2. Computers and Crime When the property damaged, stolen, or lost is electronic information, the “place” broken into is a computer, and the perpetrators are often bright youngsters, the crimes appear to be taken much less seriously by society BUT Not by the Victims. Kershner, Computer Literacy, Kendall Hunt

  3. Hacking Among computer professionals • a person who “hacks” at a program is • investigating the computer system or a program to better understand it • and to get better performance • So, in this context hacking is neither unethical or illegal. Kershner, Computer Literacy, Kendall Hunt

  4. Hacking, Cracking & the Press • Hacker – someone who illegally breaks into computer systems. • Professionals call this person a Cracker. • Someone who “cracks” open the computer system • Circumventing security procedures • May not intend to do damage • Electronic Vandals

  5. Crackers (Hackers): Who are They? • Computer-competent teens • Working from their bedrooms or dorm rooms • Just “goofing” around • Not all are just for fun • Industrial Espionage • Disgruntled individuals • ? Terrorists? • Malicious Individuals • Angry former employees • Criminals

  6. Hackers and Crackers Why do “kids” hack? • Because they can • Merely “looking around” • reading other people’s email is interesting • No harm intended • The “thrill” of breaking in and breaching the electronic security of the system • Gain Knowledge?!?!?

  7. Hacking and Cracking To some it is a never ending, authentic, role-playing game with federal, state and local authorities as the “bad guys!”

  8. Hacking and Cracking • At the least intrusive this is the electronic equivalent of voyeurism • The privacy of individuals and organizations is being violated • Frequently the non-intrusive intent doesn’t quite work out and electronic property is destroyed.

  9. Hacking and Victims • Privacy and Security violated • Property lost or damaged • Down time interrupts businesses • Identity and Credit card theft FEAR, ANGER, FRUSTRATION

  10. Hacking and Society’s Response • “No one has been hurt” • “It’s the company’s fault for not having better security” • The “invaded” computer system somehow benefits because security weaknesses have been uncovered • “They’re just kids goofing around!”

  11. Hacking and Society • Ethical Dilemma: • Is this morally wrong? • Are these activities illegal? • What if anything should we do about this?

  12. Hacking • Ponder this: • What if it were surface mail and not email? • What if the voyeurism were standing outside your dorm room or your sister’s bedroom? • What if the break-in where to your house or dorm room and all those who entered did was leave you a note saying: “Ha-ha, I can get in any time!” • What if the stolen property was your car? • Where sensitive information is involved, can we afford to believe that nothing has been changed or compromised even by accident?

  13. Hacking and Ethics Individuals have the Right to expect their property and privacy protected regardless of the form!

  14. Hackers and Crackers • Where to they hack? • Sloan Kettering Cancer Institute • Los Alamos National Laboratory • Credit Card Companies • Stolen card numbers • Made purchases IDENTITY THEFT • School Computers • Changed grades • Stolen exams

  15. Hackers and Crackers • Where do they hack? • Burglarized telephone company networks • Stole services • Accidentally moved satellite orbits disrupting services • Disrupted 911 service • Stole Credit Card numbers and passwords and posted them to bulletin boards for the “fun of it.”

  16. Hacking and Cracking Are crackers pranksters or criminals? If no one is physically hurt does that make computer eavesdropping right/OK? When crackers violate society’s codes, should they be held less responsible than their street-wise counterparts? Aren’t the crimes the same?

More Related