Professional Documents
Culture Documents
Chap 016
Chap 016
Chap 016
SIXTEEN
Computer Crime
eighth edition
LEARNING OBJECTIVES
Outline the types of crimes in which computer is the target Discuss computers as an instrumentality of the crime Describe computers as incidental to the crime Explain crimes associated with the prevalence of computers Understand the tools that computer criminals use to commit crime Discuss debates regarding privacy issues concerning the regulation of the Internet Outline profiles of computer crime suspects Explain techniques for investigating computer crime Assess methods to prevent computer crimes
McGraw-Hill
16-1
COMPUTER ABUSE
Any intentional act involving knowledge of computer use or technology in which the perpetrator could have made a gain and the victim could have experienced a loss; includes acts that may not be covered by criminal laws
McGraw-Hill
16-2
COMPUTER CRIME
Any illegal act in which knowledge of computer technology is used to commit the offense
McGraw-Hill
16-3
McGraw-Hill
16-4
Theft
Much information stored in a computer can have value to the owner
Theft of Services
The use of these proprietary services without payment is theft
Fraud
Fraud using a computer exploits the trust, guaranteed by law, in a business transaction
16-5
McGraw-Hill
16-6
COMPUTERS AS INCIDENTAL TO THE CRIME In this category the computer does not conduct the illegal transaction, it simply facilitates it. Examples include:
Money Laundering Criminal Enterprise Child Pornography Pedophilia and Sexual Assault
McGraw-Hill
16-7
Intellectual Property Violations Misuse of Telephone Systems Component Theft and Counterfeiting Identity Theft Corporate Crime
McGraw-Hill
16-8
4.0 3.5 3.0 2.5 2.0 1.5 1.0 0.5 0 Middle East/Africa
1999 2000
Eastern Europe
Latin America
Asia/Pacific
Western Europe
North America
(Source: International Planning and Research Corporation, Sixth Annual BSA Global Software Piracy Study (Washington, DC: Business Software Alliance, May 2001): retrieved from www.bsa.org/resources/2001-05-21.55pdf, Aug. 30, 2001.)
McGraw-Hill
16-9
Thomas Brummett/Photodisc)
McGraw-Hill
Discovery Tools
Most network intrusions attack targets of opportunity
Cryptoanalysis Tools
Bruce Schneier defines cryptanalysis as the art and science of accessing secured information without conventional means
Exploits
Exploits are a generic class of programs that are written to take advantage of a security hold
McGraw-Hill
Attack Codes
Attack code is malicious software intended to impair or destroy the function of another computer or network resource
Delivery Vehicles
Delivery vehicles provide computer criminals with a method to deliver their attack software
McGraw-Hill
TROJAN HORSE
Any computer program that is altered or designed to perform an unwanted or malicious function while appearing to perform a routine or benign function
McGraw-Hill
McGraw-Hill
McGraw-Hill
One side of the debate focuses on the vast amount of pornographic material available through the internet Proponents for regulation say the web should be treated like any other medium Opponents of regulation say this would involve limiting free speech and violate the First Amendment The debate is ongoing and unresolved to date
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
Firewalls
A firewall is a device or software that acts as a checkpoint between a network or stand-alone computer and the Internet
McGraw-Hill
Password Discipline
The single greatest problem in computer security is password protection
McGraw-Hill