Professional Documents
Culture Documents
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Introduction
Sources of information
Computer Security Institute (CSI) annual survey
KPMG surveys
Association of Certified Fraud Examiners
(ACFE) survey
Chapter
11-2
Computer Crime,
Abuse, and Fraud
Computer Crime
Manipulation of a computer or computer data
Dishonestly obtain money, acquire property, or
something of value, or cause a loss
Computer Abuse
Unauthorized use of, or access to, a computer
Against the wishes of the owner
Chapter
11-3
Computer Crime Examples
Chapter
11-4
Computer Crime,
Abuse, and Fraud
Misappropriation of Assets
Misuse of company assets
Committed by employees within an organization
Chapter
11-5
Asset Misappropriation
Examples
Chapter
11-6
Federal Legislation of
Computer Crimes
Chapter
11-7
CFAA Fraudulent Acts
Chapter
11-8
CFAA Fraudulent Acts
Chapter
11-10
Federal Legislation Affecting
the Use of Computers
Chapter
11-11
State Legislation
Chapter
11-12
Study Break #1
Chapter
11-13
Study Break #1 - Answer
Chapter
11-14
Study Break #2
Chapter
11-15
Study Break #2 - Answer
Chapter
11-16
Computer-Crime Statistics
Impact on AISs
Favored target due to control of financial resources
Prized target for disgruntled employees
Responsible for designing, selecting, and implementing
controls that protect AISs
Reliance on auditors to verify financial statement
Additional Items
Ability to mislead public if information is incomplete or
inaccurate
Difficulty in detecting fraudulent activities
Large amount of losses Chapter
11-18
Compromising Valuable Information:
The TRW Credit Data Case
Summary
Credit rating company
Altered company credit ratings for a fee
Clients relied on inaccurate information
Analysis
Data diddling proprietary data
Fair Credit Reporting Act protection of
consumer
Chapter
11-19
Wire Fraud and Computer Hacking:
Edwin Pena and Robert Moore
Summary
Voice over Internet Protocol (VoIP)
Hacked into other providers network
Billed those companies
Analysis
Growth of hacking
Importance of education and prevention
Utilize ethical hackers for instrusion testing
Chapter
11-20
Denial of Service:
The 2003 Internet Crash
Summary
Slammer worm
Identified weakness in Microsoft SQL Server
2000 software
Analysis
Denial of Service (DOS) attacks
Computer Viruses
Computer Worms and Worm Programs
Boot-sector Viruses and Trojan Horse Programs Chapter
11-21
Protecting Systems
Preventing Viruses
Firewalls
Antivirus software
Antivirus control procedures
Chapter
11-22
Common Types of Computer
Crime and Abuse
Chapter
11-23
Preventing Computer Crime
and Fraud
Chapter
11-24
10 Simple Steps to Safer PCs
Chapter
11-25
10 Simple Steps to Safer PCs
Chapter
11-26
Preventing Computer Crime
and Fraud
Implement Controls
Identify Computer Criminals
Nontechnical Backgrounds
Noncriminal Backgrounds
Education, Gender, and Age
Chapter
11-28
Fraud Losses and Education
Level of Perpetrator
Chapter
11-29
Recognizing Symptoms of
Employee Fraud
Accounting Irregularities
Unreasonable Anomalies
Lifestyle Changes
Behavioral Changes
Chapter
11-30
Study Break #3
Chapter
11-31
Study Break #3 - Answer
Chapter
11-32
Study Break #4
Chapter
11-33
Study Break #4 - Answer
Chapter
11-34
Ethical Issues, Privacy, and
Identity Theft
Ethics
A set of moral principles or values
Governs organizations and individuals
Ethical behavior
Making choices and judgments that are morally
proper
Acting accordingly
Chapter
11-35
Ethical Issues, Privacy, and
Identity Theft
Chapter
11-37
Ethical Issues, Privacy, and
Identity Theft
Identity Theft
Dumpster diving
Phishing
Smishing
Chapter
11-38
Identity Theft Methods
Chapter
11-39
Study Break #5
A. Dial-back system
B. Local area network
C. Computer worm
D. Identity theft
Chapter
11-40
Study Break #5 - Answer
A. Dial-back system
B. Local area network
C. Computer worm
D. Identity theft
Chapter
11-41
Copyright
Copyright 2012 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser
may make backup copies for his/her own use only and not for distribution
or resale. The Publisher assumes no responsibility for errors, omissions,
or damages, caused by the use of these programs or from the use of the
information contained herein.
Chapter
11-42
Chapter 11
Chapter
11-43