+ All Categories
Home > Documents > BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer...

BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer...

Date post: 23-Dec-2015
Category:
Upload: justin-griffin
View: 215 times
Download: 0 times
Share this document with a friend
Popular Tags:
24
BY :STUDENT NAME Computer Crimes
Transcript
Page 1: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

B Y : S T U D E N T N A M E

Computer Crimes

Page 2: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer Crime Introduction

2

The development of computer technology has created a vast new potential for crime.

Some of these are just new spins and old fashioned crimes such embezzlement, extortion , counterfeiting, and espionage created by the existence of computers.

Others are new kinds of crimes that would not have existed without computers such as destructive software

Page 3: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer Crimes Definition

3

Computer crimes is defined any illegal act for which knowledge of computer technology is used to commit offense

A computer may be either actively or passively involved in the crime

It is actively involved if teh computer is used to break into files, steal money.

And it is passively involved where a computer is used to keep track of clients and goods

Page 4: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer crimes classification 4

McEwen classifies computer crimes into five categories:

1. internal computer crimes (viruses)

2. Telecommunications crimes

3. Computer manipulation crimes (embezzlement, fraud)

4. Support of criminals enterprises (data bases)

5. Hardware/ software thefts

Page 5: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Kinds of Computer crime 5

Computer crimes can be divided into two basic categories

1. Crimes against computer

2. Crimes committed using computer

Page 6: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Crimes against computers 6

Crimes against computers can involve damage to computer hardware or software, or theft of computer technology

Damage to computer : people get angry at computer for a variety of reasons, and making an action against the computer

Erasure all computer data and tampering with computer programsDestroy files of the network corporate customersPouring a salt solution or a caustic fluid into the operational consoleAttacks on computer systems would not have to physically harm the

computers themselves, there are many ways to destroy the information on a computer without ever coming physically near it or damaging its hardware

The theft of computer themselves

Page 7: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Crimes using computers 7

The computer has become a new tool that can act like an extension of the human mind. It can be used for good or evil

the positive uses are applauded and should be encouraged to augnment human development.

Some of the negative use involve systems that make killing in war war more efficient, and the expanding growth of industries supported by computer use that endanger the environment.

Other applications are in the area of crime, where the computer creates new possibilities for criminal activity and can be used as the criminal’s tool to carry them out

Page 8: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Crimes using computers embezzlement by computer

8

Computer did’nt do it, computers don’t commit crimes, but they can be misused

Page 9: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Theft9

Theft of information is one of te problems that rise using electronic credit cards, where people can access credit card records to alter bad reports for customers, or sells some’one good credit history to another who need one

Th idea is that anyone who can access computerized records may be able to change them, and can create a who fictious person and give him or her a birthdate, birthplace, job, school record and social number .

Page 10: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Fraud 10

Embezzlement is a kind of fraud Three mens working at a travel agency computerized reservation terminal

to create fictitious frequent flyer accounts and credit them with miles flown by passengers who where not in frequent flyer program

Computerized election results present a good opportunity for tampering and outright fraud, where it can report the wrong winner. In this kind of fraud it is difficult of verifying results and it is inpossible the detection of thefraud

Using the tax is one kind of fraud, where in some case some tax records can be erased and in another bills , additional tax can be added

One of tehfraud issue is to selling the stock market, that means entering on the stock system of the firms and salling the market

Stealing the online identities of the richest people, like stealing credit card numbers from the Internet.

Page 11: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Counterfeiting

11

Counterfeiting has just recently gone from an art requiring highly skilled practitioners to an easy job for anyone with high quality copier or a computer, a scanner, and a laser printer.

ATM CARDs Watermarks

Page 12: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Other computer crimes

12

Data interception: interception of data in transmission Data modification: alteration , destruction, or erasing of data Data theft: taking or copying data, regardless od wether it is protected by other

laws, copyright, privacy Network interference: impeding or preventing access for others. The most

common example of this action is instigating (a distributed denial of service attack. Floding web sites or Internet service providers.

Network sabotage : modification or destruction of network or a system Unauthorized access: hacking or cracking to gain access to a system or data Virus dissemination: introduction of software damaging to system or data Aiding and abettin) enabling the communication of a cyber crime Computer related forgery alteration of data with intent to represent as authentic Computer related fraud : alteration of data with intent to derive economic

benefit from its misrepresentation.

Page 13: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer crime victims

13

It is said that computer crimes are victimlessbut this is not true. If there is embezzlement or fraud there are some one, some companies that suffer.

If software or hardware or information is stolen, it is stolen from some individual. That has the right to it.

The more these agreements are broken, the more the fabric of society is weakened, and we all suffer.

Thus though big business and the government may seen to be the victims of computer crime, in fact we are really all its

victims.

Page 14: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer criminals

14Most often, they are employed by the institution they attack.

Computer crime is antiseptic and has none of the physical risks of normal crime.

It also appears easier to rob someone you cannot see, through an inanimate device.

It often doesn’t seem like crime at all to the prepetrator but more like game, a test of skills and intelligence.

One of the problem with computer criminals is that often they are not severely punished

Those who have committed damaging break-ins to computer systems often only pay a fine and serve a short time on probation or community service

It is said that: the just individual is one who protects money when it is not in use, and the one best prepared to protect money is the one who knows well how to steal it

Page 15: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer crime stoppers

Arwa Zabian Computer Ethics

15 Not only are computers serving as the tools for criminals, they are also

becoming the toole of the authorities for maintaining security and apprehending crinimals.

Computerized security checks can be instant checks of finger prints, hand prints, voice prints, or even eye prints. However, there are devious and /or violent means around all these checks

Computer can be used to track criminals’ patterns, to figure out where they may strike next

Computer is used to find proof of tax envasion, is used in tracking terrorists and their networks

Computer can be used to track a person’s movements and financial transactions

Use of ATM card or credit card can place the user at a particular location at a certain time, that means helps in discovering the crime when it is committed.

Computerized fingerprint identification systems have greatly improved the apprehension of criminals

Page 16: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Computer crime stoppers:16

Noting that currently the computer technologies are able to be aware of the crimes that can be perpetrated using computers and to use the computer them selves in tracking down offenders .

Page 17: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Failure to report computer crime

17 Many computer crimes are not ever detected, because their subtletly , or

because those who have been violated sadly have very little knowledge of how their computer system work.

Even when crimes are discovered, they are not always reported to the authorities.

There are a number of reasons for this, banks, insurance companies and other organizations who base much of their success on public trust do not want the public to know that their security has been compromised.

Other reasons include a lack of confidence in the ability of the authorities to apprehend the criminals

There are still very few dedicated computer crime units that have knowledge able personnel to deal with these matters.

Many victims state that they do not report computer related offenses because of unsatisfactory responses by law enforcement agencies to previous complaints.

Page 18: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

Failure to report computer crime

18

Companies often do not know who they should contactInvestigations can be very time consuming and prosecutions

can also be expensive.There is also fear that publicizing the crime will give others

ideas, including perhaps even ideas about methods of attackThefts of information may not seem so important to a judge

who have no personal use for such informationSo, for a variety of reasons, many computer crimes are not

discovered or, even if they are, are not fully prosecuted hich gives rise to an increase in computer crime which are damaging to the stability of society

Page 19: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

The Cyber Crime Laws of Nations

19

Based on its findings in the E-Readiness study, and in the wake of the Philippines inability to prosecute the student responsible for the “I Love You” virus, McConnell International surveyed its global network of information technology policy officials to determine the state of cyber security laws around the world.

Countries were asked to provide laws that would be used to prosecute criminal acts involving both private and public sector computers.

Over fifty national governments4 responded with recent pieces of legislation, copies of updated statutes, draft legislation, or statements that no concrete course of action has been planned to respond to a cyber attack on the public or private sector. Countries were provided the opportunity to review the presentation of the results in draft, and this report reflects their comments.

Page 20: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

The Cyber Crime Laws of Nations

20

Countries that provided legislation were evaluated to determine whether their criminal statutes had been extended into cyberspace to cover ten different types of cyber crime in four categories:

1. data-related crimes, including interception, modification, and theft

2. network-related crimes, including interference and sabotage

3. crimes of access, including hacking and virusDistributionand associated computer-related crimes, including aiding and

abetting cyber criminals, computer fraud, and computer forgery.

Page 21: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

The Cyber Crime Laws of Nations

21

Thirty-three of the countries surveyed have not yet updated their laws to address any type of cyber crime.

Of the remaining countries, nine have enacted legislation to address five or fewer types of cyber crime, and ten have updated their laws to prosecute against six or more of the ten types of cyber crime.

The countries evaluated are: Albania, Australia, Brazil, Bulgaria, Burundi, Canada, Chile, China, Cuba, the Czech Republic, Denmark, Dominican Republic, Egypt, Estonia, Ethiopia, Fiji, France, Gambia, Hungary, Iceland, India, Iran, Italy, Japan, Jordan, Kazakhstan, Latvia, Lebanon, Lesotho, Malaysia, Malta, Mauritius, Moldova, Morocco, New Zealand, Nicaragua, Nigeria, Norway, Peru, Philippines, Poland, Romania, South Africa, Spain, Sudan, Turkey, United Kingdom, United States, Vietnam, Yugoslavia, Zambia, and Zimbabwe.

Page 22: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

22

Page 23: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

23

Page 24: BY :STUDENT NAME Computer Crimes. Computer Crime Introduction 2 The development of computer technology has created a vast new potential for crime. Some.

The End


Recommended