Computer CrimeComputer Crimeandand
Identity TheftIdentity Theft
Abe Orabi Tom Ballaro Tim WilliamsAbe Orabi Tom Ballaro Tim Williams
What is Computer Crime?What is Computer Crime?
Using computer technology to maliciously Using computer technology to maliciously affect othersaffect others
What’s At Risk:What’s At Risk:- Intellectual Property- Intellectual Property- Personal Information- Personal Information- Organizational Information- Organizational Information- National and Global Security- National and Global Security
TechniquesTechniques Scavenging:Scavenging: for stray data or garbage for clues that for stray data or garbage for clues that
might unlock the secrets of a system might unlock the secrets of a system Zapping:Zapping: which means penetrating a computer by which means penetrating a computer by
unlocking the master key to its program and then unlocking the master key to its program and then destroying it by activating its own emergency program destroying it by activating its own emergency program
Worms or worm programs:Worms or worm programs: entail the deletion of entail the deletion of portions of a computer's memory, thus creating a hole of portions of a computer's memory, thus creating a hole of missing information missing information
Time bombs or Logic bombs:Time bombs or Logic bombs: which involve the which involve the insertion of routines that can be triggered later by the insertion of routines that can be triggered later by the computer's clock or a combination of events. When the computer's clock or a combination of events. When the bomb goes off, the entire system, perhaps worth bomb goes off, the entire system, perhaps worth millions, will crash millions, will crash
Viruses:Viruses: are self-replicating programs which can have a are self-replicating programs which can have a similar effect to Time or Logic bombs similar effect to Time or Logic bombs
Forms Of Computer CrimeForms Of Computer Crime
Theft of MoneyTheft of Money-The transfer of payments to the wrong -The transfer of payments to the wrong
accounts accounts Theft of Personal Information:Theft of Personal Information:
- Stealing ones information through use of - Stealing ones information through use of computer technologycomputer technology
Theft of GoodsTheft of Goods - By their diversion to the wrong destination - By their diversion to the wrong destination
Theft of Computer Time:Theft of Computer Time:- Use of an employers computer resources - Use of an employers computer resources
for personal work for personal work
Who are the criminals?Who are the criminals?
25%
24%
31%20%
Managers/Supervisors
Computer Staff
People with LittleComputer Skill
Other
What is Identity Theft?What is Identity Theft?
The criminal act of using stolen The criminal act of using stolen information about a person to assume that information about a person to assume that person’s identityperson’s identity
HistoryHistory
Through the creation of online databases,Through the creation of online databases,
businesses, and online networks, in thebusinesses, and online networks, in the
past 20 years, it past 20 years, it
has become easier has become easier
to commit identity to commit identity
theft through the theft through the
use of computer crimes.use of computer crimes.
Ways to Commit Identity TheftWays to Commit Identity Theft
Computer as a Tool:Computer as a Tool:
Hacking into databases:Hacking into databases:- Social Security Numbers- Social Security Numbers
- Credit Card Information- Credit Card Information
- License Information- License Information
Ways to Commit Identity TheftWays to Commit Identity Theft
Computer as an Object:Computer as an Object:
Internet Fraud:Internet Fraud:
- Applying for Credit Cards- Applying for Credit Cards
- Buying goods - Buying goods
- Money Transfers- Money Transfers
Ways to Prevent Identity TheftWays to Prevent Identity Theft
Computer ProtectionComputer Protection
- Passwords- Passwords
- Firewalls- Firewalls
- Data Encryption- Data Encryption Personal ProtectionPersonal Protection
- Keep a watchful eye on bank - Keep a watchful eye on bank accounts and credit statementsaccounts and credit statements
I am a Victim, What Should I do?I am a Victim, What Should I do?
Close the accounts you know or you think Close the accounts you know or you think may have been compromisedmay have been compromised
File a report with the state or local policeFile a report with the state or local police
File a complaint with the FTCFile a complaint with the FTC