ODU CS 300 - Computer Crime (17 pages)

Previewing pages 1, 2, 3, 4, 5, 6 of 17 page document View the full content.
View Full Document

Computer Crime



Previewing pages 1, 2, 3, 4, 5, 6 of actual document.

View the full content.
View Full Document
View Full Document

Computer Crime

67 views

Other


Pages:
17
School:
Old Dominion University
Course:
Cs 300 - Computers in Society

Unformatted text preview:

Computer Crime and Security Measures Week 5 cont Computer Crime Computers make activities easier including illegal activities New ways to commit old crimes Crimes against businesses insiders and outsiders hackers competitors criminal gangs Crime Computers make the crimes easier to commit more devastating harder to detect doable from long distances New Terms Virus Worm Trojan Horse Trap Door Fraud and Embezzlement Embezzlement fraudulent appropriation of property by a person to whom it has been entrusted Requires special knowledge special programming skill poor security Fraud and Embezzlement Aided by anonymity complexities of modern transactions increase the opportunities Defending Against Dishonest Employees Rotate responsibilities of employees with access to sensitive systems Unique ID and password Limit access to system Audit trails Screening and background checks of employees Good security policies Defending Against Fraud Immediate checks on legitimate cards Programs to detect unusual spending Holograms and photos on cards Magnetic or digital finger printing Physical hardware deterrents Why is the Problem so Big Most customers do not want to verify ID Most merchants don t check Security vs convenience Sabotage and Information Theft Unhappy employees Attacks by competitors Who else Nonmalicious Hacking No harm is done Service exposes security weaknesses Help create need for tougher security Information wants to be free Some companies are ripping us of Harmless Time and efort are involved in tracking down the intruder and shut of means of access Verifications of no damage Uncertainty that system is preserved Trespassing is illegal Mechanisms of Protection Password protection Internet Medium for researchers open access ease of use ease of sharing Security depended on trust Attitudes about security have not caught up with the risk Improving Security Awareness of extent of problem Education of users Acceptance of responsibility Internet Protection Firewall Crime Laws



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Computer Crime and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Crime and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?