Professional Documents
Culture Documents
Social Issues and Professional Practice: Module 3: Computer and Internet Crime
Social Issues and Professional Practice: Module 3: Computer and Internet Crime
Objectives
What key trade-offs and ethical issues are associated with the
safeguarding of data and information systems?
Why has there been a dramatic increase in the number of computer-
related security incidents in recent years?
What are the most common types of computer security attacks?
Who are the primary perpetrators of computer crime, and what are
their objectives?
What are the key elements of a multilayer process for managing
security vulnerabilities based on the concept of reasonable assurance?
What actions must be taken in response to a security incident?
What is computer forensics, and what role does it play in responding
to a computer incident?
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
Increased Reliance on
Commercial Software with
Known Vulnerabilities
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF EXPLOITS
ROOTKITS PHISHING
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF EXPLOITS
a piece of programming code, usually
disguised as something else, that causes
a computer to behave in an unexpected
and usually undesirable manner.
TYPES OF EXPLOITS
WORM
Worms differ from viruses in that
they can propagate without human
intervention, often sending copies of
themselves to other computers by
email.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF EXPLOITS
a program in which malicious code
TROJAN HORSE is hidden inside a seemingly
harmless program.
TYPES OF EXPLOITS
TYPES OF EXPLOITS
a set of programs that enables its user to
gain administrator-level access to a
computer without the end user’s consent
or knowledge.
DDOS ATTACKS
TYPES OF EXPLOITS
TYPES OF EXPLOITS
Spear-phishing is a
the act of PHISHING variation of phishing
fraudulently using in which the phisher
email to try to get sends fraudulent
the recipient to emails to a certain
reveal personal data. organization’s
employees.
Vishing is similar to
Smishing is another
smishing except that the
variation of phishing that victims receive a voice
involves the use of Short mail telling them to call
Message Service (SMS)
a phone number or
texting. access a Web site.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF PERPETRATORS
MALICIOUS
HACKERS CRACKERS INSIDERS
INDUSTRIAL
SPIES PERPETRATORS CYBERCRIMINALS
HACKTIVISTS CYBERTERRORISTS
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF PERPETRATORS
HACKERS CRACKERS
test the limitations of someone who breaks
information systems out into someone else's
of intellectual curiosity computer system, often
—to see whether they on a network; bypasses
can gain access and how passwords or licenses in
far they can go. computer programs.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
TYPES OF PERPETRATORS
MALICIOUS INDUSTRIAL
INSIDERS SPIES
TYPES OF PERPETRATORS
HACTIVISTS CYBERTERRORISTS
HACTIVISM a combination of the launches computer-based attacks
words hacking and activism, is against other computers or
hacking to achieve a political or social networks in an attempt to
goal. intimidate or coerce a government
in order to advance certain political
or social objectives.
CYBERCRIMINALS
motivated by the potential for monetary gain and hack into
computers to steal, often by transferring money from one
account to another to another
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
ESTABLISHING A
PREVENTION
SECURITY POLICY
RESPONSE
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN
IMPLEMENTING TRUSTWORTHY
COMPUTING
COMPUTER FORENSICS
END OF MODULE 3