Computer Crime and Security MeasuresComputer CrimeCrimeNew TermsFraud and EmbezzlementSlide 6Defending Against Dishonest EmployeesDefending Against FraudWhy is the Problem so Big?Sabotage and Information TheftNonmalicious HackingHarmless?Mechanisms of ProtectionInternetImproving SecurityInternet ProtectionCrime LawsComputer Crime and Security MeasuresWeek 5 cont.Computer CrimeComputers make activities easierincluding illegal activitiesNew ways to commit old crimesCrimes againstbusinesses - insiders and outsidershackers, competitors, criminal gangsCrimeComputers make the crimeseasier to commitmore devastatingharder to detectdoable from long distancesNew TermsVirusWormTrojan HorseTrap DoorFraud and EmbezzlementEmbezzlement - fraudulent appropriation of property by a person to whom it has been entrustedRequiresspecial knowledgespecial programming skillpoor securityFraud and EmbezzlementAided byanonymitycomplexities of modern transactions increase the opportunitiesDefending Against Dishonest EmployeesRotate responsibilities of employees with access to sensitive systemsUnique ID and passwordLimit access to systemAudit trailsScreening and background checks of employeesGood security policiesDefending Against FraudImmediate checks on legitimate cardsPrograms to detect unusual spendingHolograms and photos on cardsMagnetic or digital finger printingPhysical hardware deterrentsWhy is the Problem so Big?Most customers do not want to verify IDMost merchants don’t checkSecurity vs convenienceSabotage and Information TheftUnhappy employeesAttacks by competitorsWho else?Nonmalicious HackingNo harm is doneService - exposes security weaknessesHelp create need for tougher securityInformation wants to be freeSome companies are ripping us ofHarmless?Time and efort are involved in tracking down the intruder and shut of means of accessVerifications of no damageUncertainty that system is preservedTrespassing is illegalMechanisms of ProtectionPassword protectionInternetMedium for researchers open accessease of useease of sharingSecurity depended on trustAttitudes about security have not caught up with the riskImproving SecurityAwareness of extent of problemEducation of usersAcceptance of responsibilityInternet ProtectionFirewallCrime LawsComputer technology challenged existing laws and led to new onesLarcenyUse of computer timeNew lawsAccess and use of computer without authorization is
View Full Document