SlideShare ist ein Scribd-Unternehmen logo
1 von 30
CHAPTER 3 COMPUTER AND INTERNET CRIME ETHICS IN INFORMATION TECHNOLOGY 2 ND  Edition 2007 by George Reynolds
OBJECTIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS A CRIME?
CRIME  is the breach of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Individual human societies may each define crime and crimes differently. While every crime violates the law, not every violation of the law counts as a crime; for example: breaches of contract and of other civil law may rank as "offences" or as "infractions". Modern societies generally regard crimes as offenses against the public or the state, distinguished from torts (offenses against private parties that can give rise to a civil cause of action).
ATTY. SAMUEL R. MATUNOG Matunog & Associates CEO, Segworks Technologies Corp. President, Davao Software Industries Association “ Crime is an act that needs to be controlled because they are destructive to public order”
IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 1997 39,626 1,058 2,134 1996 31,268 2,062 2,573 1995 32,084 3,428 2,412 1994 29,580 3,665 2,340 1993 21,267 2,282 1,334 1992 14,463 1,995 773 1991 9,629 - 406 1990 4,448 - 252 1989 2,869 - 132 1988 539 - 6
IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 2006 674,235 977 - 2005 624,634 591 - 2004 717,863 795 - 2003 542,754 934 137,529 2002 204,841 880 82,094 2001 118,907 1,417 52,658 2000 56,365 1,280 21,756 1999 34,612 2,099 9,859 1998 41,871 1,001 3,734
INCREASE INTERNET SECURITY INCIDENTS ,[object Object],[object Object],[object Object],[object Object]
TYPES OF ATTACKS VIRUS is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.
HISTORY (Virus) ,[object Object],[object Object],[object Object],[object Object]
HISTORY (Virus) VIRUS PROGRAMS 1970’s  - CREEPER VIRUS by Bob Thomas 1981  - ELK CLONER by Richard Skrenta 1986  - ©BRAIN by Farooq Alvi Brothers, Lahore Pakistan
TYPES OF ATTACKS WORM is also a harmful computer program and has the ability to propagate without human intervention unlike virus.
HISTORY (Worm) The actual term 'worm' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail! On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act
TYPES OF ATTACKS TROJAN HORSE Is a program that gets secretly installed on a computer, planting a harmful payload that can allow the hacker who planted it to do such things as steal passwords or spy on users by recording keystrokes and transmitting them to a third party.
HISTORY (Trojan Horse) ,[object Object],[object Object],[object Object],[object Object],[object Object]
LOGIC BOMB (Trojan Horse) ,[object Object],[object Object],[object Object]
TYPES OF ATTACKS DENIAL-OF-SERVICE is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CLASSIFICATION OF PERPETRATORS OF COMPUTER CRIME Type of Perpetrator Objective Resources available to perpetrator Level of risk taking acceptable to perpetrator Frequency of Attack Hacker Test limits of system, gain publicity Limited Minimal High Cracker Cause problems, steal data, corrupt systems Limited Moderate Medium Insider Financial gain or disrupt company’s information systems Knowledge of systems and passwords Moderate Low  Industrial Spy Capture trade secrets or gain competitive advantage Well funded, well trained Minimal Low Cybercriminal Financial gain Well funded, well trained Moderate Low Cyber Terrorist Cause destruction to key infrastructure components Not necessarily well funded nor well trained Very High Low
TYPES OF PERPETRATOR HACKER an individual who tests the limitations of systems out of intellectual curiosity.
WHITE HAT HACKERS ,[object Object],[object Object],[object Object]
TOP 5 WHITE HAT HACKERS 1. Stephen Wozniak 2. Tim Berners-Lee 3. Linus Torvalds 4. Richard Stallman 5. Tsutomu Shimomura
BLACK HAT HACKER (Cracker) ,[object Object],[object Object],[object Object]
1. Jonathan James 2. Adrian Lamo 3. Kevin Mitnick 4. Kevin Poulsen 5. Robert Tappan Morris TOP 5 BLACK HAT CRACKERS
FORMS OF COMPUTER CRIMINALS ,[object Object],[object Object],[object Object],[object Object]
LEGAL OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REDUCING INTERNET VULNERABILITIES ,[object Object],[object Object],[object Object]
PREVENTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTION ,[object Object],[object Object]
REFERENCES http://www.docstoc.com http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://www.merriam-webster.com http://gcn.com/articles/2010/07/27/wifi-hole-puts-networks-at-risk.aspx http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://en.wikipedia.org/wiki/Crime www.cert.org/stats http://en.wikipedia.org/wiki/Computer_virus http://en.wikipedia.org/wiki/Computer_worm http://www.ehow.com/facts_6771981_history-trojan-horse-viruses.html

Weitere ähnliche Inhalte

Was ist angesagt?

Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherSHUBHA CHATURVEDI
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Was ist angesagt? (20)

Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Email security
Email securityEmail security
Email security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Web security
Web securityWeb security
Web security
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Web security
Web securityWeb security
Web security
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Security services
Security servicesSecurity services
Security services
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Pgp
PgpPgp
Pgp
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Andere mochten auch

Running Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoRunning Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoAmazon Web Services
 
Cassandra Talk: Austin JUG
Cassandra Talk: Austin JUGCassandra Talk: Austin JUG
Cassandra Talk: Austin JUGStu Hood
 
How OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaHow OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaData Con LA
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSAmazon Web Services
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werkenOkke Jan Douma
 
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Filipe Barretto
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewMarco Amado
 
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Jessica DuVerneay
 
'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009Ed Chi
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big dataRaul Chong
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Stijn van Schaijk
 
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHarmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHBaseCon
 
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...DIWUG
 
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Lucas Jellema
 
Collaboration with Eclipse final
Collaboration with Eclipse finalCollaboration with Eclipse final
Collaboration with Eclipse finalKenu, GwangNam Heo
 
Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Phil Wilkins
 

Andere mochten auch (20)

Running Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoRunning Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je Cho
 
Cassandra Talk: Austin JUG
Cassandra Talk: Austin JUGCassandra Talk: Austin JUG
Cassandra Talk: Austin JUG
 
How OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaHow OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman Marya
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWS
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werken
 
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
 
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
 
'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big data
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation
 
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHarmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
 
Azure OMS
Azure OMSAzure OMS
Azure OMS
 
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
 
Brochure go2UBL
Brochure go2UBLBrochure go2UBL
Brochure go2UBL
 
ecdevday4
ecdevday4ecdevday4
ecdevday4
 
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
 
Bennett raglinphotography
Bennett raglinphotographyBennett raglinphotography
Bennett raglinphotography
 
Collaboration with Eclipse final
Collaboration with Eclipse finalCollaboration with Eclipse final
Collaboration with Eclipse final
 
Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...
 

Ähnlich wie Computer and Internet Crime Ethics

Ähnlich wie Computer and Internet Crime Ethics (20)

PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
cyber crime
cyber crimecyber crime
cyber crime
 

Mehr von Mar Soriano

Windows evolution
Windows evolutionWindows evolution
Windows evolutionMar Soriano
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2Mar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOYMar Soriano
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryMar Soriano
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphoneMar Soriano
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 

Mehr von Mar Soriano (20)

Windows evolution
Windows evolutionWindows evolution
Windows evolution
 
FLYING CAR
FLYING CARFLYING CAR
FLYING CAR
 
Google’s Car
Google’s CarGoogle’s Car
Google’s Car
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Water mill
Water millWater mill
Water mill
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 
Transformer1
Transformer1Transformer1
Transformer1
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatory
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Transformer1
Transformer1Transformer1
Transformer1
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphone
 
Jean
JeanJean
Jean
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Computer and Internet Crime Ethics

  • 1. CHAPTER 3 COMPUTER AND INTERNET CRIME ETHICS IN INFORMATION TECHNOLOGY 2 ND Edition 2007 by George Reynolds
  • 2.
  • 3. WHAT IS A CRIME?
  • 4. CRIME is the breach of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Individual human societies may each define crime and crimes differently. While every crime violates the law, not every violation of the law counts as a crime; for example: breaches of contract and of other civil law may rank as "offences" or as "infractions". Modern societies generally regard crimes as offenses against the public or the state, distinguished from torts (offenses against private parties that can give rise to a civil cause of action).
  • 5. ATTY. SAMUEL R. MATUNOG Matunog & Associates CEO, Segworks Technologies Corp. President, Davao Software Industries Association “ Crime is an act that needs to be controlled because they are destructive to public order”
  • 6. IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 1997 39,626 1,058 2,134 1996 31,268 2,062 2,573 1995 32,084 3,428 2,412 1994 29,580 3,665 2,340 1993 21,267 2,282 1,334 1992 14,463 1,995 773 1991 9,629 - 406 1990 4,448 - 252 1989 2,869 - 132 1988 539 - 6
  • 7. IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 2006 674,235 977 - 2005 624,634 591 - 2004 717,863 795 - 2003 542,754 934 137,529 2002 204,841 880 82,094 2001 118,907 1,417 52,658 2000 56,365 1,280 21,756 1999 34,612 2,099 9,859 1998 41,871 1,001 3,734
  • 8.
  • 9. TYPES OF ATTACKS VIRUS is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.
  • 10.
  • 11. HISTORY (Virus) VIRUS PROGRAMS 1970’s - CREEPER VIRUS by Bob Thomas 1981 - ELK CLONER by Richard Skrenta 1986 - ©BRAIN by Farooq Alvi Brothers, Lahore Pakistan
  • 12. TYPES OF ATTACKS WORM is also a harmful computer program and has the ability to propagate without human intervention unlike virus.
  • 13. HISTORY (Worm) The actual term 'worm' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail! On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act
  • 14. TYPES OF ATTACKS TROJAN HORSE Is a program that gets secretly installed on a computer, planting a harmful payload that can allow the hacker who planted it to do such things as steal passwords or spy on users by recording keystrokes and transmitting them to a third party.
  • 15.
  • 16.
  • 17. TYPES OF ATTACKS DENIAL-OF-SERVICE is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely
  • 18.
  • 19. CLASSIFICATION OF PERPETRATORS OF COMPUTER CRIME Type of Perpetrator Objective Resources available to perpetrator Level of risk taking acceptable to perpetrator Frequency of Attack Hacker Test limits of system, gain publicity Limited Minimal High Cracker Cause problems, steal data, corrupt systems Limited Moderate Medium Insider Financial gain or disrupt company’s information systems Knowledge of systems and passwords Moderate Low Industrial Spy Capture trade secrets or gain competitive advantage Well funded, well trained Minimal Low Cybercriminal Financial gain Well funded, well trained Moderate Low Cyber Terrorist Cause destruction to key infrastructure components Not necessarily well funded nor well trained Very High Low
  • 20. TYPES OF PERPETRATOR HACKER an individual who tests the limitations of systems out of intellectual curiosity.
  • 21.
  • 22. TOP 5 WHITE HAT HACKERS 1. Stephen Wozniak 2. Tim Berners-Lee 3. Linus Torvalds 4. Richard Stallman 5. Tsutomu Shimomura
  • 23.
  • 24. 1. Jonathan James 2. Adrian Lamo 3. Kevin Mitnick 4. Kevin Poulsen 5. Robert Tappan Morris TOP 5 BLACK HAT CRACKERS
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. REFERENCES http://www.docstoc.com http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://www.merriam-webster.com http://gcn.com/articles/2010/07/27/wifi-hole-puts-networks-at-risk.aspx http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://en.wikipedia.org/wiki/Crime www.cert.org/stats http://en.wikipedia.org/wiki/Computer_virus http://en.wikipedia.org/wiki/Computer_worm http://www.ehow.com/facts_6771981_history-trojan-horse-viruses.html