Screening and background checks of employees. Good securit - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Screening and background checks of employees. Good securit

Description:

Screening and background checks of employees. Good security policies. Defending Against Fraud ... Information want to be free. Some companies are ripping us ... – PowerPoint PPT presentation

Number of Views:132
Avg rating:3.0/5.0
Slides: 18
Provided by: janetbr
Learn more at: https://www.cs.odu.edu
Category:

less

Transcript and Presenter's Notes

Title: Screening and background checks of employees. Good securit


1
Computer Crime and Security Measures
  • Week 5 cont.

2
Computer Crime
  • Computers make activities easier
  • including illegal activities
  • New ways to commit old crimes
  • Crimes against
  • businesses - insiders and outsiders
  • hackers, competitors, criminal gangs

3
Crime
  • Computers make the crimes
  • easier to commit
  • more devastating
  • harder to detect
  • doable from long distances

4
New Terms
  • Virus
  • Worm
  • Trojan Horse
  • Trap Door

5
Fraud and Embezzlement
  • Embezzlement - fraudulent appropriation of
    property by a person to whom it has been
    entrusted
  • Requires
  • special knowledge
  • special programming skill
  • poor security

6
Fraud and Embezzlement
  • Aided by
  • anonymity
  • complexities of modern transactions increase the
    opportunities

7
Defending Against Dishonest Employees
  • Rotate responsibilities of employees with access
    to sensitive systems
  • Unique ID and password
  • Limit access to system
  • Audit trails
  • Screening and background checks of employees
  • Good security policies

8
Defending Against Fraud
  • Immediate checks on legitimate cards
  • Programs to detect unusual spending
  • Holograms and photos on cards
  • Magnetic or digital finger printing
  • Physical hardware deterrents

9
Why is the Problem so Big?
  • Most customers do not want to verify ID
  • Most merchants dont check
  • Security vs convenience

10
Sabotage and Information Theft
  • Unhappy employees
  • Attacks by competitors
  • Who else?

11
Nonmalicious Hacking
  • No harm is done
  • Service - exposes security weaknesses
  • Help create need for tougher security
  • Information want to be free
  • Some companies are ripping us off

12
Harmless?
  • Time and effort are involved in tracking down the
    intruder and shut off means of access
  • Verifications of no damage
  • Uncertainty that system is preserved
  • Trespassing is illegal

13
Mechanisms of Protection
  • Password protection

14
Internet
  • Medium for researchers
  • open access
  • ease of use
  • ease of sharing
  • Security depended on trust
  • Attitudes about security have not caught up with
    the risk

15
Improving Security
  • Awareness of extent of problem
  • Education of users
  • Acceptance of responsibility

16
Internet Protection
  • Firewall

17
Crime Laws
  • Computer technology challenged existing laws and
    led to new ones
  • Larceny
  • Use of computer time
  • New laws
  • Access and use of computer without authorization
    is illegal
Write a Comment
User Comments (0)
About PowerShow.com