UMD BMGT 326 - Chapter 11: Computer Crime and Information Technology Security

Unformatted text preview:

Chapter 11: Computer Crime and Information Technology SecurityAIS in the Business WorldInformation: one of today’s most important economic assets for any organization- Often stored and transmitted electronically; vulnerable to computer crime (espec. in law firms)*Understanding the types of computer crimes allows one to understand more clearly how AIS is affectedby common malicious acts*Taxonomy for Computer Crime (Carter; 1995):- Target-criminal targets the system or its datao Objective : impact the confidentiality, availability, and/or integrity of data stored on the computer- Instrumentality- computer as instrumentality of crime; uses computer to further criminal endo In crimes targeting the computer: the data are object of the crime and computer is used to commit the crime- Incidental- computer is not required for crime but is related to the criminal acto Use of computer: simplifies criminal actions and makes crimes difficult to trace- Associated- technological growth creates new crime targets and new ways of reaching victimso Essentially, new way to commit old crimes*Lines between each type of crime are blurred; transactions may overlap the different types of crimes*Business Risks and Threats to Information Systems1. Frauda. Computer fraud (1989)- any illegal act for which knowledge of computer technology is used to commit the offensei. Fundamentally people fraud- computer system needs human intervention to perpetrate fraudb. Different types of fraud require different computer skillsi. Data diddling - intentional modification of information (basic skills)ii. Theft of info in secure database (advanced skills)c. After series of scandals and lapses in corp. governance: Sarbanes Oxley introduced to restore customer confidence in stock marketsi. Organizations required to publish reports on internal controls in place2. Error- losses due to error vary depending on: (1) where error originated; (2) time it may take to identify and correct iti. Single error when entering product code= wrong item being shippedii. Programming error in transaction system=millions lost and angry customersb. Implementing preventative controls: (1)detects/corrects errors before they occur; (2) prevents financial losses and negative impacts to organization’s image3. Service Interruption and Delays- can bring organization to standstill; lead to missed deadlines for payables and receivablesa. Main categories for service interruptions: accidental, willful neglect, malicious behaviori. Accidental : ex. someone shutting down wrong machineii. Willful neglect: ex. outdated antivirus softwareiii. Malicious behavior: ex. hacker launching a denial of service attack against company’s web site4. Disclosure of Confidential Informationa. Privacy laws- managers and other stakeholders aware of critical need to protect information assets5. Intrusionsa. Main objective : gain access to a network or system by bypassing security controls or exploiting a lack of adequate controlsb. Motivations vary; ex: fun, profiti. Hackers for fun often choose “low-hanging fruit”: data and/or systems relativelyunprotected and easy to accessii. Hackers for profit often target specific organization or information before attack6. Information Theft- targets organization’s most precious asset: information (represented numerically)a. Data includes: trade secrets, marketing plans, advertising campaigns, research and development for new products, customer listsb. Higher losses for corp. because these assets often have higher value7. Information Manipulation- occurs at any stage of information processing, from input to outputi. Input manipulation- most common form of fraud; easy to perform; basic computer skills; hard to detect (may look valid until in-depth examination)i. ex: employee creates fake refunds in payables system to benefit a family memberii. Program manipulation -complex task; extremely difficult to detect; modification and detection require advanced computer knowledgei. Involves modification or insertion of specific functions in the computer information systemiii. Other manipulations take advantage of automatic repetitions of a computer programi. Characteristic of “salami technique”-unnoticeable slices of a financial transaction are removed and transferred to another accounta. Ex: computer programmer employed in a bank could redirect interest smaller than penny into his own account; over time will add up to a large sum8. Malicious Softwarea. Many forms: 1. Virus infecting a system and modifying its data2. Worm replicating over network, causing a bottleneck3. Trojan horse allowing an unauthorized backdoor into a system, directly impacting the confidentiality of files residing in system4. Logic bombs; ex: in payroll system- would detect missing employee number when paychecks are issued and trigger the deletion of all employee records9. Denial-of-Service Attacks- prevent computer systems and networks from functioning in accordance with intended purposea. Attacks: (1) cause loss of service to users by consuming scarce resources with bandwidth, memory, or processor cycles; (2) disrupt configuration information or physical componentsb. In distributed attacks: many compromised systems under control of one or many attackers are used to multiply the impact by launching concurrent attacks against a determined targeti. Devastating to organization; bring computer operations to standstill; virtually impossible to block10. Web Site Defacements- form of internal graffiti where intruders modify pages on the site in order to leave their mark, send a message, or mock the organizationi. Hacktivism : politically-motivated defacement; attempts to send message to organization or part of online community11. Extortion- result of computer being the object of a crimea. Extortionist contacts organization after successfully stealing info or launching a DOS attack; if demands unmet: threatens to reveal info to public or to launch a prolonged denial of service Perpetrators of Computer CrimeWhat distinguishes the individuals that commit computer crimes? The intent to their crime*Any person of any age with computer skills, motivated by the technical challenge; by the potential for gain, notoriety, or revenge; or by the promotion of ideological beliefs is a potential computer criminal*1. Script kiddie- young, inexperienced hacker who uses tools and scripts written by other for the purpose of attacking


View Full Document

UMD BMGT 326 - Chapter 11: Computer Crime and Information Technology Security

Download Chapter 11: Computer Crime and Information Technology Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 11: Computer Crime and Information Technology Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 11: Computer Crime and Information Technology Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?