Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering...
Transcript of Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering...
![Page 1: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/1.jpg)
Computer Crime
1
![Page 2: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/2.jpg)
Number of Incidents Reported to Computer
Emergency Response Team (CERT)
2
![Page 3: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/3.jpg)
Computer Crime and Security Survey
3
![Page 4: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/4.jpg)
The Computer as a Tool to Commit
Crime
Social engineering
E.g. pre-texting, phishing (email)
Dumpster diving
To get sensitive personal information such as address,
password, credit card numbers, etc.
Identity theft
Cyberterrorism
4
![Page 5: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/5.jpg)
Computers as Objects of Crime
Illegal access and use
Hackers
Crackers
Information and equipment theft
Software and Internet piracy
Computer-related scams
International computer crime
5
![Page 6: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/6.jpg)
How to Respond to a Security Incident
6
![Page 7: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/7.jpg)
Data Alteration and Destruction
Virus
Worm
Logic bomb
Trojan horse
7
![Page 8: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/8.jpg)
The Six Computer Incidents with the Greatest
Worldwide Economic Impact
8
![Page 9: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/9.jpg)
Top Viruses – July 2002
9
![Page 10: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/10.jpg)
Preventing Computer-Related Crime
Crime prevention by state and federal
agencies
Crime prevention by corporations
Public Key Infrastructure (PKI)
Biometrics
Anti-virus programs
10
![Page 11: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/11.jpg)
Preventing Computer-Related Crime
Intrusion Detection Software
Managed Security Service Providers
(MSSPs)
Internet Laws for Libel and Protection of
Decency
11
![Page 12: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/12.jpg)
Preventing Crime on the Internet
Develop effective Internet and security
policies
Use a stand-alone firewall with network
monitoring capabilities
Monitor managers and employees
Use Internet security specialists to perform
audits
12
![Page 13: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/13.jpg)
Common Methods Used to Commit
Computer Crimes
13
![Page 14: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/14.jpg)
How to Protect Your Corporate Data from
Hackers
14
![Page 15: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/15.jpg)
Internet Security Threads
Viruses and hostile Web applications (e.g.
Java Applets or ActiveX controls)
Trojan horses
Adware and spyware
Spam emails
Identity theft and spoofing
Social engineering
15
![Page 16: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/16.jpg)
Internet Security Measures
Firewall
Antivirus software
Email encryption
Encryption and authentication
Frequent updates of software
Always beware of incoming threads
16
![Page 17: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information](https://reader035.fdocuments.us/reader035/viewer/2022071218/6052fafe649a5b4b1317a460/html5/thumbnails/17.jpg)
Antivirus Software
Symantec: Norton Antivirus, Norton Internet
Security, etc.
McAfee: McAfee Virus Scan, McAfee
Internet Security, etc
Kaspersky
Bit defender
BKAV
… 17