25
COMPUTER CRIME An Overview

COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Embed Size (px)

Citation preview

Page 1: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

COMPUTER CRIMECOMPUTER CRIME

An OverviewAn Overview

Page 2: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

AgendaAgenda

Background and History

Potential Criminals

Ethics Survey

Criminal Activity

Preventative Measures

Background and History

Potential Criminals

Ethics Survey

Criminal Activity

Preventative Measures

Page 3: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Evolution of the Information AgeEvolution of the Information Age

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Growth Projections

Internet

The Inevitable

Growth Projections

Internet

The Inevitable

Page 4: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Escalation and FrequencyEscalation and Frequency5-year increase5-year increase

0

500

1000

1500

2000

2500

1990 1995

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Page 5: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Escalation and FrequencyEscalation and FrequencyFBI Computer Crimes

Division Reports:

•15 security breaches every day

•75% annual increase in recent years

FBI Computer Crimes Division Reports:

•15 security breaches every day

•75% annual increase in recent years

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Page 6: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Escalation and FrequencyEscalation and FrequencyDepartment of Defense StudyDepartment of Defense StudyDepartment of Defense StudyDepartment of Defense Study

7860

7470

390390

10721072

# of successful system# of successful system attacks (8932 attempts)attacks (8932 attempts)

# of detections (out of # of detections (out of 7860 successful attempts)7860 successful attempts)

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Page 7: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Intrusion CostsIntrusion CostsErnst and Young Survey:

• More than 1/2 incurred a loss

• Each loss exceeded $100,000

• Seventeen losses exceeded $1,000,000

Ernst and Young Survey:

• More than 1/2 incurred a loss

• Each loss exceeded $100,000

• Seventeen losses exceeded $1,000,000

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Page 8: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Case StudyCase StudyHacker Penetrates Citibank SystemHacker Penetrates Citibank System

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

Page 9: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Case StudyCase StudyHacker Penetrates Citibank SystemHacker Penetrates Citibank System

I. Background & HistoryI. Background & History I. Background & HistoryI. Background & History

The criminals

The crime

The result

The criminals

The crime

The result

Page 10: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Employees/Ex-employeesEmployees/Ex-employees

% of crimes committed % of crimes committed

80%80%

II. Potential CriminalsII. Potential Criminals II. Potential CriminalsII. Potential Criminals

•UsersUsers•AnalystsAnalysts•ProgrammersProgrammers

20%20%

Page 11: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Case StudyCase StudyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics Survey

# Agreeing % Agreeing

1. A person is justified 11 5%in making copies of

employers software.

2. I would copy software 75 41%(illegally) for my use.

3. A user is justified in 6 3%accessing / using theservices ( of anothercompany’s computer ) to his advantage.

# Agreeing % Agreeing

1. A person is justified 11 5%in making copies of

employers software.

2. I would copy software 75 41%(illegally) for my use.

3. A user is justified in 6 3%accessing / using theservices ( of anothercompany’s computer ) to his advantage.

# Agreeing % Agreeing

1. A person is justified 11 5%in making copies of

employers software.

2. I would copy software 75 41%(illegally) for my use.

3. A user is justified in 6 3%accessing / using theservices ( of anothercompany’s computer ) to his advantage.

# Agreeing % Agreeing

1. A person is justified 11 5%in making copies of

employers software.

2. I would copy software 75 41%(illegally) for my use.

3. A user is justified in 6 3%accessing / using theservices ( of anothercompany’s computer ) to his advantage.

Page 12: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Case StudyCase StudyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics Survey

# Agreeing % Agreeing4. I would crack a com- 15 7%

puter if I knew how.

5. There is nothing wrong 21 10%in writing a virus programto output the message“Have a nice day.”

6. Management can be so 15 7%unfair at times that a person can be justified inerasing files.

# Agreeing % Agreeing4. I would crack a com- 15 7%

puter if I knew how.

5. There is nothing wrong 21 10%in writing a virus programto output the message“Have a nice day.”

6. Management can be so 15 7%unfair at times that a person can be justified inerasing files.

Page 13: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Case StudyCase StudyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics SurveyIII. Ethics Survey

# Agreeing % Agreeing

7. I would adjust a 15 7%system to avoid an account service chargefor an overdrawnchecking account.

8. There is nothing wrong 13 6%

with cracking anothercompany’s computer toidentify other customersto sell to.

# Agreeing % Agreeing

7. I would adjust a 15 7%system to avoid an account service chargefor an overdrawnchecking account.

8. There is nothing wrong 13 6%

with cracking anothercompany’s computer toidentify other customersto sell to.

Page 14: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

HackingHacking

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

The technical-minded crime The technical-minded crime

Page 15: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

VirusesViruses

Nondestructive or Malevolent

Nondestructive or Malevolent

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

Page 16: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Trojan HorseTrojan Horse History

Vehicle for viruses and logic bombs

History

Vehicle for viruses and logic bombs

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

Page 17: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Fraud and AbuseFraud and Abuse

Case StudiesCase Studies

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

Race Track Trifecta

Huntsville Prison

Robin Hood of Northwest

Race Track Trifecta

Huntsville Prison

Robin Hood of Northwest

Page 18: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

TheftTheftUnauthorized

software duplication

Unauthorized software duplication

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

Page 19: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Corporate EspionageCorporate Espionage

Increasing

Threat

Increasing

Threat

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

Page 20: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

SabotageSabotage

25% of all crime committed 25% of all crime committed

25%25%

IV. Criminal ActivityIV. Criminal Activity IV. Criminal ActivityIV. Criminal Activity

7575%%

Page 21: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Education and TrainingEducation

and Training A Logical First Step A Logical First Step

V. Preventative MeasuresV. Preventative Measures V. Preventative MeasuresV. Preventative Measures

Page 22: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Education and TrainingEducation and Training10 Suggestions from Ernst and Young:

Confidentiality Statements

Regular Back-Ups

Policies and Procedures

Control Intranet Access.

Boot-level Passwords

10 Suggestions from Ernst and Young:

Confidentiality Statements

Regular Back-Ups

Policies and Procedures

Control Intranet Access.

Boot-level Passwords

V. Preventative MeasuresV. Preventative Measures V. Preventative MeasuresV. Preventative Measures

Page 23: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Education and TrainingEducation and Training10 Suggestions from E & Y (continued):

Control Internet Access

Restrict Use of Internet

Classify Data

Secure All Computers

Require file-level Passwords

10 Suggestions from E & Y (continued):

Control Internet Access

Restrict Use of Internet

Classify Data

Secure All Computers

Require file-level Passwords

V. Preventative MeasuresV. Preventative Measures V. Preventative MeasuresV. Preventative Measures

Page 24: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

SoftwareSoftware

A Variety to Choose From

Positive Results

• Indianapolis Power & Light case study

A Variety to Choose From

Positive Results

• Indianapolis Power & Light case study

V. Preventative MeasuresV. Preventative Measures V. Preventative MeasuresV. Preventative Measures

Page 25: COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background

Legal RamificationsLegal Ramifications A Better Prepared Law

Enforcement

New Laws With Harsher Penalties

A Better Prepared Law Enforcement

New Laws With Harsher Penalties

V. Preventative MeasuresV. Preventative Measures V. Preventative MeasuresV. Preventative Measures