DOC PREVIEW
ODU CS 300 - Computer Crime

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Computer Crime and Security MeasuresComputer CrimeCrimeNew TermsFraud and EmbezzlementSlide 6Defending Against Dishonest EmployeesDefending Against FraudWhy is the Problem so Big?Sabotage and Information TheftNonmalicious HackingHarmless?Mechanisms of ProtectionInternetImproving SecurityInternet ProtectionCrime LawsComputer Crime and Security MeasuresWeek 5 cont.Computer CrimeComputers make activities easierincluding illegal activitiesNew ways to commit old crimesCrimes againstbusinesses - insiders and outsidershackers, competitors, criminal gangsCrimeComputers make the crimeseasier to commitmore devastatingharder to detectdoable from long distancesNew TermsVirusWormTrojan HorseTrap DoorFraud and EmbezzlementEmbezzlement - fraudulent appropriation of property by a person to whom it has been entrustedRequiresspecial knowledgespecial programming skillpoor securityFraud and EmbezzlementAided byanonymitycomplexities of modern transactions increase the opportunitiesDefending Against Dishonest EmployeesRotate responsibilities of employees with access to sensitive systemsUnique ID and passwordLimit access to systemAudit trailsScreening and background checks of employeesGood security policiesDefending Against FraudImmediate checks on legitimate cardsPrograms to detect unusual spendingHolograms and photos on cardsMagnetic or digital finger printingPhysical hardware deterrentsWhy is the Problem so Big?Most customers do not want to verify IDMost merchants don’t checkSecurity vs convenienceSabotage and Information TheftUnhappy employeesAttacks by competitorsWho else?Nonmalicious HackingNo harm is doneService - exposes security weaknessesHelp create need for tougher securityInformation wants to be freeSome companies are ripping us ofHarmless?Time and efort are involved in tracking down the intruder and shut of means of accessVerifications of no damageUncertainty that system is preservedTrespassing is illegalMechanisms of ProtectionPassword protectionInternetMedium for researchers open accessease of useease of sharingSecurity depended on trustAttitudes about security have not caught up with the riskImproving SecurityAwareness of extent of problemEducation of usersAcceptance of responsibilityInternet ProtectionFirewallCrime LawsComputer technology challenged existing laws and led to new onesLarcenyUse of computer timeNew lawsAccess and use of computer without authorization is


View Full Document

ODU CS 300 - Computer Crime

Download Computer Crime
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer Crime and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Crime 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?