0% found this document useful (0 votes)
15 views

3610 Lecture8 Computer Crimes

Uploaded by

Tolosa Tafese
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

3610 Lecture8 Computer Crimes

Uploaded by

Tolosa Tafese
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Computer Crimes

Chapter 9
Definition

 Illegal act that involves a computer system or computer-related


system
 Telephone, microwave, satellite telecommunications system
 That connect one or more computers or computer-related systems
Three Categories

 Natural or inadvertent attack


 Human blunders, errors and omissions
 Intentional trheats
Two Aspects of Cyber Crime

 Virus
 Hacking
Two Types of Attacks

 Penetration
 Insider threats
 Hackers
 Criminal Groups
 Hactivism
 Denial of Service Attacks
 Inside
 Outside
Motivation of Attacks

 Business and Industrial Espionage


 Joke/Hoax
 Political Activism
 Political and Military Espionage
 Terrorism/Extortion
 Vendetta
Questions

Are we prepared for a cyber attack?


What are the consequences?
Congressional Hearing
Intelligence and Security in Cyberspace

Comparison make of the efforts of the


government to a “toddler soccer game
were everyone just runs around trying
to kick the ball somewhere
Reasons for No Information

 Lack of reporting requirements


 Public sector – fear of market reaction to news
 Lack of enforcement of existing reporting mechanisms
 Detection of insider attacks
 Lack of security agencies or trained security agencies
Reason for Growth in Cyber Crimes

 Rapid technology growth


 Easy availability of hacker tools
 Anonymity
 Cut-and-past programming technology
 Communication speed
 High degree of internetworking
 Increasing dependency on computers
How Much Does It Cost?
Who Knows?
 Difficult to quantify the number of attacks
 No baseline
 Not reporting insider attacks
 Lack of cooperation between emergency and computer crime
reporting centers

Continued
How Much Does It Cost?
Who Knows?
 Unpredictable types of attacks
 Virus mutation
 Not enough trained system administrators
 Primitive monitoring technology
Social and Ethical Consequences

 Psychological effects – hate and bigotry


 Acceptance of the norm and resulting moral decay
 Loss of privacy
 Trust
 Others?

You might also like