Title: Computer Crime, Ethics, Privacy
1Computer Crime, Ethics, Privacy
2Computer Crime
- What is computer crime?
- Why is it important to know this?
3Computer Crime Abuse
- Whats the Difference between the 2?
4Legislation
- The Computer Fraud and Abuse Act of 1986
- Fair Credit Reporting Act of 1970
- Freedom of Information Act of 1970
- Federal Privacy Act of 1974
- Small Business Computer Security and Education
Act of 1984 - Computer Fraud and Abuse Act of 1986
- Computer Fraud and Abuse Act (1996 amendment)
- Computer Security Act of 1987
- USA Patriot Act of 2001
- Cyber Security Enhancement Act of 2002
- CAN-SPAM Act of 2003
5Kinds of Computer Crime
- Commit a felony
- Software
- Stealing money
- Computer hardware
- Information
- Access
- Extortion
6Computer Fraud
- What is Computer fraud?
- What is Economic espionage?
7Computer-Crime Statistics
- Sometimes we know what we know
- Sometimes we know what we dont know
- But . . . . . its what we dont know that we
dont know that are the most difficult.
8The Growth of Computer Crime
- Why?
- Resources
- Instructions
- computer controls
9Three Representative Computer Crimes Cases
- Compromising Valuable Information Computer
Hacking - Denial of service
10The TRW Credit Data Case
- information computer crime
- computerized credit data.
- Two key issues
11The Kevin D. Mitnick Case
- Hackers
- Shoulder surfing
- Password controls
- Social engineering
- Lock-out systems
- Dial-back systems
12Robert T. Morris and the Internet Virus
- Created one of the worlds most famous compute
viruses. - Became first person to be indicted under the
Computer Fraud and Abuse Act of 1986. - This case illustrates vulnerability of networks
to virus infections.
13Computer Viruses
- What are they?
- Boot-sector viruses
- Worm viruses
14Robert T. Morris and the Internet Virus Case
- Trojan Horse programs
- Logic Bomb programs
- applet
15Methods for Thwarting Computer Viruses
Anti-Virus Software
- What does anti- virus software do?
- Scans
- identifies
- cleanse
16Drawbacks of Anti-Virus Software Programs
17Anti-Virus Procedural Controls
- Reputable
- Copying
- Download
- Email
- Backup files
18Organizational Safeguards Against Computer Viruses
- Education
- Policies
- Passwords
- Filters
- Disaster recovery plan.
19Methods for Thwarting Computer Abuse
- Top management
- Education
- Security inventory
- Controls
- Computer criminals
20Methods for Thwarting Computer Abuse
- Symptoms
- Irregularities
- Weaknesses
- Changes in an employee
- Anomalies
- Employ forensic
accountants
21Computers and Ethical Behavior
- What is meant by ethics?
- What is ethical behavior?
22Ethical Issues
- Honesty
- Protecting Computer Systems
- Protecting Confidential Information
- Social Responsibility
- Rights of Privacy
- Acceptable Use of Computer Hardware
and Software.
23How Can Organizations Encourage Ethical Behavior ?
24Computers and Privacy Issues
- Company policies with respect to privacy
- Privacy policy
- Disposal of computers
- Online privacy seals