SlideShare a Scribd company logo
1 of 30
CHAPTER 3 COMPUTER AND INTERNET CRIME ETHICS IN INFORMATION TECHNOLOGY 2 ND  Edition 2007 by George Reynolds
OBJECTIVES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS A CRIME?
CRIME  is the breach of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Individual human societies may each define crime and crimes differently. While every crime violates the law, not every violation of the law counts as a crime; for example: breaches of contract and of other civil law may rank as "offences" or as "infractions". Modern societies generally regard crimes as offenses against the public or the state, distinguished from torts (offenses against private parties that can give rise to a civil cause of action).
ATTY. SAMUEL R. MATUNOG Matunog & Associates CEO, Segworks Technologies Corp. President, Davao Software Industries Association “ Crime is an act that needs to be controlled because they are destructive to public order”
IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 1997 39,626 1,058 2,134 1996 31,268 2,062 2,573 1995 32,084 3,428 2,412 1994 29,580 3,665 2,340 1993 21,267 2,282 1,334 1992 14,463 1,995 773 1991 9,629 - 406 1990 4,448 - 252 1989 2,869 - 132 1988 539 - 6
IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 2006 674,235 977 - 2005 624,634 591 - 2004 717,863 795 - 2003 542,754 934 137,529 2002 204,841 880 82,094 2001 118,907 1,417 52,658 2000 56,365 1,280 21,756 1999 34,612 2,099 9,859 1998 41,871 1,001 3,734
INCREASE INTERNET SECURITY INCIDENTS ,[object Object],[object Object],[object Object],[object Object]
TYPES OF ATTACKS VIRUS is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.
HISTORY (Virus) ,[object Object],[object Object],[object Object],[object Object]
HISTORY (Virus) VIRUS PROGRAMS 1970’s  - CREEPER VIRUS by Bob Thomas 1981  - ELK CLONER by Richard Skrenta 1986  - ©BRAIN by Farooq Alvi Brothers, Lahore Pakistan
TYPES OF ATTACKS WORM is also a harmful computer program and has the ability to propagate without human intervention unlike virus.
HISTORY (Worm) The actual term 'worm' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail! On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act
TYPES OF ATTACKS TROJAN HORSE Is a program that gets secretly installed on a computer, planting a harmful payload that can allow the hacker who planted it to do such things as steal passwords or spy on users by recording keystrokes and transmitting them to a third party.
HISTORY (Trojan Horse) ,[object Object],[object Object],[object Object],[object Object],[object Object]
LOGIC BOMB (Trojan Horse) ,[object Object],[object Object],[object Object]
TYPES OF ATTACKS DENIAL-OF-SERVICE is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CLASSIFICATION OF PERPETRATORS OF COMPUTER CRIME Type of Perpetrator Objective Resources available to perpetrator Level of risk taking acceptable to perpetrator Frequency of Attack Hacker Test limits of system, gain publicity Limited Minimal High Cracker Cause problems, steal data, corrupt systems Limited Moderate Medium Insider Financial gain or disrupt company’s information systems Knowledge of systems and passwords Moderate Low  Industrial Spy Capture trade secrets or gain competitive advantage Well funded, well trained Minimal Low Cybercriminal Financial gain Well funded, well trained Moderate Low Cyber Terrorist Cause destruction to key infrastructure components Not necessarily well funded nor well trained Very High Low
TYPES OF PERPETRATOR HACKER an individual who tests the limitations of systems out of intellectual curiosity.
WHITE HAT HACKERS ,[object Object],[object Object],[object Object]
TOP 5 WHITE HAT HACKERS 1. Stephen Wozniak 2. Tim Berners-Lee 3. Linus Torvalds 4. Richard Stallman 5. Tsutomu Shimomura
BLACK HAT HACKER (Cracker) ,[object Object],[object Object],[object Object]
1. Jonathan James 2. Adrian Lamo 3. Kevin Mitnick 4. Kevin Poulsen 5. Robert Tappan Morris TOP 5 BLACK HAT CRACKERS
FORMS OF COMPUTER CRIMINALS ,[object Object],[object Object],[object Object],[object Object]
LEGAL OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REDUCING INTERNET VULNERABILITIES ,[object Object],[object Object],[object Object]
PREVENTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTION ,[object Object],[object Object]
REFERENCES http://www.docstoc.com http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://www.merriam-webster.com http://gcn.com/articles/2010/07/27/wifi-hole-puts-networks-at-risk.aspx http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://en.wikipedia.org/wiki/Crime www.cert.org/stats http://en.wikipedia.org/wiki/Computer_virus http://en.wikipedia.org/wiki/Computer_worm http://www.ehow.com/facts_6771981_history-trojan-horse-viruses.html

More Related Content

What's hot

What's hot (20)

Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Information security management
Information security managementInformation security management
Information security management
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Multimedia:Media Ethics Basics
Multimedia:Media Ethics Basics Multimedia:Media Ethics Basics
Multimedia:Media Ethics Basics
 
Introduction to Media Studies
Introduction to Media StudiesIntroduction to Media Studies
Introduction to Media Studies
 

Viewers also liked

Running Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoRunning Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoAmazon Web Services
 
Cassandra Talk: Austin JUG
Cassandra Talk: Austin JUGCassandra Talk: Austin JUG
Cassandra Talk: Austin JUGStu Hood
 
How OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaHow OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaData Con LA
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSAmazon Web Services
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werkenOkke Jan Douma
 
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Filipe Barretto
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewMarco Amado
 
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Jessica DuVerneay
 
'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009Ed Chi
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big dataRaul Chong
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Stijn van Schaijk
 
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHarmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHBaseCon
 
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...DIWUG
 
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Lucas Jellema
 
Collaboration with Eclipse final
Collaboration with Eclipse finalCollaboration with Eclipse final
Collaboration with Eclipse finalKenu, GwangNam Heo
 
Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Phil Wilkins
 

Viewers also liked (20)

Running Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je ChoRunning Business Critical Workloads on AWS – Nam Je Cho
Running Business Critical Workloads on AWS – Nam Je Cho
 
Cassandra Talk: Austin JUG
Cassandra Talk: Austin JUGCassandra Talk: Austin JUG
Cassandra Talk: Austin JUG
 
How OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman MaryaHow OpenTable uses Big Data to impact growth by Raman Marya
How OpenTable uses Big Data to impact growth by Raman Marya
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWS
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werken
 
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
Rio Cloud Computing Meetup 25/01/2017 - Lançamentos do AWS re:Invent 2016
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
 
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
Lightweight Taxonomy Approaches - Taxonomy Bootcamp 2015
 
'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009'Living Lab' for HCI - presentation made at HCI International 2009
'Living Lab' for HCI - presentation made at HCI International 2009
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big data
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation
 
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload DiversityHarmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
Harmonizing Multi-tenant HBase Clusters for Managing Workload Diversity
 
Azure OMS
Azure OMSAzure OMS
Azure OMS
 
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
 
Brochure go2UBL
Brochure go2UBLBrochure go2UBL
Brochure go2UBL
 
ecdevday4
ecdevday4ecdevday4
ecdevday4
 
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
Oracle OpenWorld 2016 Review - Focus on Data, BigData, Streaming Data, Machin...
 
Bennett raglinphotography
Bennett raglinphotographyBennett raglinphotography
Bennett raglinphotography
 
Collaboration with Eclipse final
Collaboration with Eclipse finalCollaboration with Eclipse final
Collaboration with Eclipse final
 
Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...Oracle integration cloud service (ICS) best practices learned from the field ...
Oracle integration cloud service (ICS) best practices learned from the field ...
 

Similar to Computer and Internet Crime Ethics

Similar to Computer and Internet Crime Ethics (20)

PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
cyber crime
cyber crimecyber crime
cyber crime
 

More from Mar Soriano

Windows evolution
Windows evolutionWindows evolution
Windows evolutionMar Soriano
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2Mar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
Wave power ships
Wave power shipsWave power ships
Wave power shipsMar Soriano
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOYMar Soriano
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryMar Soriano
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphoneMar Soriano
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 

More from Mar Soriano (20)

Windows evolution
Windows evolutionWindows evolution
Windows evolution
 
FLYING CAR
FLYING CARFLYING CAR
FLYING CAR
 
Google’s Car
Google’s CarGoogle’s Car
Google’s Car
 
Google’s prius2
Google’s prius2Google’s prius2
Google’s prius2
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
Wave power ships
Wave power shipsWave power ships
Wave power ships
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
3 d laptop
3 d laptop3 d laptop
3 d laptop
 
Water mill
Water millWater mill
Water mill
 
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY NEPTUNE : The World  Largest Undersea Observatory. - JS.MOCOY
NEPTUNE : The World Largest Undersea Observatory. - JS.MOCOY
 
Transformer1
Transformer1Transformer1
Transformer1
 
Neptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatoryNeptune the world’s largest undersea observatory
Neptune the world’s largest undersea observatory
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Transformer1
Transformer1Transformer1
Transformer1
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
The difference between a cell phone, smartphone
The difference between a cell phone, smartphoneThe difference between a cell phone, smartphone
The difference between a cell phone, smartphone
 
Jean
JeanJean
Jean
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Computer and Internet Crime Ethics

  • 1. CHAPTER 3 COMPUTER AND INTERNET CRIME ETHICS IN INFORMATION TECHNOLOGY 2 ND Edition 2007 by George Reynolds
  • 2.
  • 3. WHAT IS A CRIME?
  • 4. CRIME is the breach of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Individual human societies may each define crime and crimes differently. While every crime violates the law, not every violation of the law counts as a crime; for example: breaches of contract and of other civil law may rank as "offences" or as "infractions". Modern societies generally regard crimes as offenses against the public or the state, distinguished from torts (offenses against private parties that can give rise to a civil cause of action).
  • 5. ATTY. SAMUEL R. MATUNOG Matunog & Associates CEO, Segworks Technologies Corp. President, Davao Software Industries Association “ Crime is an act that needs to be controlled because they are destructive to public order”
  • 6. IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 1997 39,626 1,058 2,134 1996 31,268 2,062 2,573 1995 32,084 3,428 2,412 1994 29,580 3,665 2,340 1993 21,267 2,282 1,334 1992 14,463 1,995 773 1991 9,629 - 406 1990 4,448 - 252 1989 2,869 - 132 1988 539 - 6
  • 7. IT SECURITY INCIDENTS Year Mail Messages Processed Hotline Calls Received Incidents Report Received 2006 674,235 977 - 2005 624,634 591 - 2004 717,863 795 - 2003 542,754 934 137,529 2002 204,841 880 82,094 2001 118,907 1,417 52,658 2000 56,365 1,280 21,756 1999 34,612 2,099 9,859 1998 41,871 1,001 3,734
  • 8.
  • 9. TYPES OF ATTACKS VIRUS is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.
  • 10.
  • 11. HISTORY (Virus) VIRUS PROGRAMS 1970’s - CREEPER VIRUS by Bob Thomas 1981 - ELK CLONER by Richard Skrenta 1986 - ©BRAIN by Farooq Alvi Brothers, Lahore Pakistan
  • 12. TYPES OF ATTACKS WORM is also a harmful computer program and has the ability to propagate without human intervention unlike virus.
  • 13. HISTORY (Worm) The actual term 'worm' was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail! On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting perhaps 10% of the computers then on the Internet and prompting the formation of the CERT Coordination Center and Phage mailing list. Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act
  • 14. TYPES OF ATTACKS TROJAN HORSE Is a program that gets secretly installed on a computer, planting a harmful payload that can allow the hacker who planted it to do such things as steal passwords or spy on users by recording keystrokes and transmitting them to a third party.
  • 15.
  • 16.
  • 17. TYPES OF ATTACKS DENIAL-OF-SERVICE is an attempt to make a computer resource unavailable to its intended users. It generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely
  • 18.
  • 19. CLASSIFICATION OF PERPETRATORS OF COMPUTER CRIME Type of Perpetrator Objective Resources available to perpetrator Level of risk taking acceptable to perpetrator Frequency of Attack Hacker Test limits of system, gain publicity Limited Minimal High Cracker Cause problems, steal data, corrupt systems Limited Moderate Medium Insider Financial gain or disrupt company’s information systems Knowledge of systems and passwords Moderate Low Industrial Spy Capture trade secrets or gain competitive advantage Well funded, well trained Minimal Low Cybercriminal Financial gain Well funded, well trained Moderate Low Cyber Terrorist Cause destruction to key infrastructure components Not necessarily well funded nor well trained Very High Low
  • 20. TYPES OF PERPETRATOR HACKER an individual who tests the limitations of systems out of intellectual curiosity.
  • 21.
  • 22. TOP 5 WHITE HAT HACKERS 1. Stephen Wozniak 2. Tim Berners-Lee 3. Linus Torvalds 4. Richard Stallman 5. Tsutomu Shimomura
  • 23.
  • 24. 1. Jonathan James 2. Adrian Lamo 3. Kevin Mitnick 4. Kevin Poulsen 5. Robert Tappan Morris TOP 5 BLACK HAT CRACKERS
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. REFERENCES http://www.docstoc.com http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://www.merriam-webster.com http://gcn.com/articles/2010/07/27/wifi-hole-puts-networks-at-risk.aspx http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1517422,00.html http://en.wikipedia.org/wiki/Crime www.cert.org/stats http://en.wikipedia.org/wiki/Computer_virus http://en.wikipedia.org/wiki/Computer_worm http://www.ehow.com/facts_6771981_history-trojan-horse-viruses.html