computer crime - semantic scholar€¦ · the computer as a tool to commit crime social engineering...

17
Computer Crime 1

Upload: others

Post on 16-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Computer Crime

1

Page 2: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Number of Incidents Reported to Computer

Emergency Response Team (CERT)

2

Page 3: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Computer Crime and Security Survey

3

Page 4: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

The Computer as a Tool to Commit

Crime

Social engineering

E.g. pre-texting, phishing (email)

Dumpster diving

To get sensitive personal information such as address,

password, credit card numbers, etc.

Identity theft

Cyberterrorism

4

Page 5: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Computers as Objects of Crime

Illegal access and use

Hackers

Crackers

Information and equipment theft

Software and Internet piracy

Computer-related scams

International computer crime

5

Page 6: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

How to Respond to a Security Incident

6

Page 7: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Data Alteration and Destruction

Virus

Worm

Logic bomb

Trojan horse

7

Page 8: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

The Six Computer Incidents with the Greatest

Worldwide Economic Impact

8

Page 9: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Top Viruses – July 2002

9

Page 10: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Preventing Computer-Related Crime

Crime prevention by state and federal

agencies

Crime prevention by corporations

Public Key Infrastructure (PKI)

Biometrics

Anti-virus programs

10

Page 11: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Preventing Computer-Related Crime

Intrusion Detection Software

Managed Security Service Providers

(MSSPs)

Internet Laws for Libel and Protection of

Decency

11

Page 12: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Preventing Crime on the Internet

Develop effective Internet and security

policies

Use a stand-alone firewall with network

monitoring capabilities

Monitor managers and employees

Use Internet security specialists to perform

audits

12

Page 13: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Common Methods Used to Commit

Computer Crimes

13

Page 14: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

How to Protect Your Corporate Data from

Hackers

14

Page 15: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Internet Security Threads

Viruses and hostile Web applications (e.g.

Java Applets or ActiveX controls)

Trojan horses

Adware and spyware

Spam emails

Identity theft and spoofing

Social engineering

15

Page 16: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Internet Security Measures

Firewall

Antivirus software

Email encryption

Encryption and authentication

Frequent updates of software

Always beware of incoming threads

16

Page 17: Computer Crime - Semantic Scholar€¦ · The Computer as a Tool to Commit Crime Social engineering E.g. pre-texting, phishing (email) Dumpster diving To get sensitive personal information

Antivirus Software

Symantec: Norton Antivirus, Norton Internet

Security, etc.

McAfee: McAfee Virus Scan, McAfee

Internet Security, etc

Kaspersky

Bit defender

BKAV

… 17