Sunteți pe pagina 1din 24

Computer Crime, Ethics,

Privacy
Computer Crime
What is computer crime?
Why is it important to know this?
Computer Crime & Abuse:
Whats the Difference between the 2?
Legislation
The Computer Fraud and Abuse Act of 1986
Fair Credit Reporting Act of 1970
Freedom of Information Act of 1970
Federal Privacy Act of 1974
Small Business Computer Security and Education Act
of 1984
Computer Fraud and Abuse Act of 1986
Computer Fraud and Abuse Act (1996 amendment)
Computer Security Act of 1987
USA Patriot Act of 2001
Cyber Security Enhancement Act of 2002
CAN-SPAM Act of 2003

Kinds of Computer Crime
Commit a felony
Software
Stealing money
Computer hardware
Information
Access
Extortion
Computer Fraud
What is Computer fraud?
What is Economic espionage?
Computer-Crime Statistics

Sometimes we know what we know
Sometimes we know what we dont know
But . . . . . its what we dont know that we
dont know that are the most difficult.
The Growth of
Computer Crime
Why?
Resources
Instructions
computer controls
Three Representative
Computer Crimes Cases
Compromising Valuable Information
Computer Hacking
Denial of service
The TRW Credit Data Case
information computer crime
computerized credit data.
Two key issues
The Kevin D. Mitnick Case
Hackers
Shoulder surfing
Password controls
Social engineering
Lock-out systems
Dial-back systems
Robert T. Morris and the
Internet Virus
Created one of the worlds most famous
compute viruses.
Became first person to be indicted under the
Computer Fraud and Abuse Act of 1986.
This case illustrates vulnerability of networks
to virus infections.

Computer Viruses
What are they?
Boot-sector viruses
Worm viruses
Robert T. Morris and the
Internet Virus Case
Trojan Horse programs
Logic Bomb programs
applet
Methods for Thwarting Computer
Viruses: Anti-Virus Software
What does anti- virus software do?
Scans
identifies
cleanse
Drawbacks of Anti-Virus
Software Programs
Really????
Anti-Virus
Procedural Controls
Reputable
Copying
Download
Email
Backup files
Organizational Safeguards
Against Computer Viruses
Education
Policies
Passwords
Filters
Disaster recovery plan.
Methods for
Thwarting Computer Abuse
Top management
Education
Security inventory
Controls
Computer criminals
Methods for
Thwarting Computer Abuse
Symptoms
Irregularities
Weaknesses
Changes in an employee
Anomalies
Employ forensic
accountants
Computers and Ethical
Behavior
What is meant by ethics?
What is ethical behavior?
Ethical Issues
Honesty
Protecting Computer Systems
Protecting Confidential Information
Social Responsibility
Rights of Privacy
Acceptable Use of Computer
Hardware and Software.
How Can
Organizations
Encourage Ethical
Behavior ?
Computers and Privacy Issues
Company policies with respect to privacy
Privacy policy
Disposal of computers
Online privacy seals

S-ar putea să vă placă și