Computer Crime, Ethics, Privacy - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Computer Crime, Ethics, Privacy

Description:

Computer Crime, Ethics, Privacy Computer Crime What is computer crime? Why is it important to know this? Computer Crime & Abuse: What s the Difference between the 2? – PowerPoint PPT presentation

Number of Views:936
Avg rating:3.0/5.0
Slides: 25
Provided by: PEM47
Category:

less

Transcript and Presenter's Notes

Title: Computer Crime, Ethics, Privacy


1
Computer Crime, Ethics, Privacy
2
Computer Crime
  • What is computer crime?
  • Why is it important to know this?

3
Computer Crime Abuse
  • Whats the Difference between the 2?

4
Legislation
  • The Computer Fraud and Abuse Act of 1986
  • Fair Credit Reporting Act of 1970
  • Freedom of Information Act of 1970
  • Federal Privacy Act of 1974
  • Small Business Computer Security and Education
    Act of 1984
  • Computer Fraud and Abuse Act of 1986
  • Computer Fraud and Abuse Act (1996 amendment)
  • Computer Security Act of 1987
  • USA Patriot Act of 2001
  • Cyber Security Enhancement Act of 2002
  • CAN-SPAM Act of 2003

5
Kinds of Computer Crime
  • Commit a felony
  • Software
  • Stealing money
  • Computer hardware
  • Information
  • Access
  • Extortion

6
Computer Fraud
  • What is Computer fraud?
  • What is Economic espionage?

7
Computer-Crime Statistics
  • Sometimes we know what we know
  • Sometimes we know what we dont know
  • But . . . . . its what we dont know that we
    dont know that are the most difficult.

8
The Growth of Computer Crime
  • Why?
  • Resources
  • Instructions
  • computer controls

9
Three Representative Computer Crimes Cases
  • Compromising Valuable Information Computer
    Hacking
  • Denial of service

10
The TRW Credit Data Case
  • information computer crime
  • computerized credit data.
  • Two key issues

11
The Kevin D. Mitnick Case
  • Hackers
  • Shoulder surfing
  • Password controls
  • Social engineering
  • Lock-out systems
  • Dial-back systems

12
Robert T. Morris and the Internet Virus
  • Created one of the worlds most famous compute
    viruses.
  • Became first person to be indicted under the
    Computer Fraud and Abuse Act of 1986.
  • This case illustrates vulnerability of networks
    to virus infections.

13
Computer Viruses
  • What are they?
  • Boot-sector viruses
  • Worm viruses

14
Robert T. Morris and the Internet Virus Case
  • Trojan Horse programs
  • Logic Bomb programs
  • applet

15
Methods for Thwarting Computer Viruses
Anti-Virus Software
  • What does anti- virus software do?
  • Scans
  • identifies
  • cleanse

16
Drawbacks of Anti-Virus Software Programs
  • Really????

17
Anti-Virus Procedural Controls
  • Reputable
  • Copying
  • Download
  • Email
  • Backup files

18
Organizational Safeguards Against Computer Viruses
  • Education
  • Policies
  • Passwords
  • Filters
  • Disaster recovery plan.

19
Methods for Thwarting Computer Abuse
  • Top management
  • Education
  • Security inventory
  • Controls
  • Computer criminals

20
Methods for Thwarting Computer Abuse
  • Symptoms
  • Irregularities
  • Weaknesses
  • Changes in an employee
  • Anomalies
  • Employ forensic
    accountants

21
Computers and Ethical Behavior
  • What is meant by ethics?
  • What is ethical behavior?

22
Ethical Issues
  • Honesty
  • Protecting Computer Systems
  • Protecting Confidential Information
  • Social Responsibility
  • Rights of Privacy
  • Acceptable Use of Computer Hardware
    and Software.

23
How Can Organizations Encourage Ethical Behavior ?
24
Computers and Privacy Issues
  • Company policies with respect to privacy
  • Privacy policy
  • Disposal of computers
  • Online privacy seals
Write a Comment
User Comments (0)
About PowerShow.com