computer crime

PPT 33 pages 275.0 KB Free download

Page preview (5 pages)

Scroll down 👇
1 / 33
powerpoint presentation computer crime computer and network security hojikamolov muhriddin * copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * identity theft background history and role of the social security number debate over a national id card real id act copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * background identity theft: misuse of another person’s identity to take actions permitted the owner credit card fraud #1 type of identity theft ease of opening accounts contributes to problem 10 million victims in 2004 alone average loss: $5,000 copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * gaining access to information mailboxes lost or stolen wallets dumpster diving shoulder surfing skimmers (wedges) phishing copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * history, role of social security number social security cards first issued 1936 originally …
2 / 33
united states new licenses issued by end of 2008 required to open bank account, fly on commercial airplane, or receive government service requires applicants to supply 4 different ids will probably contain a biometric identifier must contain data in machine-readable form copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * possible consequences of new licenses better identification means better law enforcement people won’t be able to change identities parents ducking child support criminals on the run new, centralized databases could lead to more identity theft copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * introduction computers getting faster and less expensive utility of computers increasing email web surfing shopping managing personal information increasing use of computers  growing importance of computer security * copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * viruses, worms, and trojan horses viruses …
3 / 33
arson addison-wesley slide 4- * the internet worm robert tappan morris, jr. graduate student at cornell released worm onto internet from mit computer effect of worm spread to 6,000 unix computers infected computers kept crashing or became unresponsive took a day for fixes to be published impact on morris suspended from cornell 3 years’ probation + 400 hours community service $150,000 in legal fees and fines copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * trojan horses trojan horse: program with benign capability that masks a sinister purpose remote access trojan: trojan horse that gives attack access to victim’s computer back orifice subseven rat servers often found within files downloaded from erotica/porn usenet sites copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * defensive measures system administrators play key role authorization: determining that a user has permission to perform a particular action …
4 / 33
right © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * phone phreaking phone phreak: someone who manipulates phone system to make free calls most popular methods steal long-distance telephone access codes guess long-distance telephone access codes use a “blue box” to get free access to long-distance lines access codes posted on “pirate boards” copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * the cuckoo’s egg clifford stoll: system administrator at lawrence berkeley laboratory tracked accounting error, discovered unauthorized user hacker was accessing military computers fbi, cia, nsa, afosi, dia joined search trail led to group of west german hackers copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * legion of doom elite group of hackers/phreaks recruited by “lex luthor” lod member robert riggs copied e911 document from a bell south computer craig neidorf published edited e911 document in his …
5 / 33
between hackers and those who download mp3 files establishment overvalues intellectual property use of technology as a “joy ride” breaking certain laws that not that big a deal parallels between response of secret service and response of riaa cyberspace is real those who break the law can be identified illegal actions can have severe consequences copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * penalties for hacking examples of illegal activities accessing without authorization any internet computer transmitting a virus or worm trafficking in computer passwords intercepting a telephone conversation, email, or any other data transmission accessing stored email messages without authorization adopting another identity to carry out an illegal activity maximum penalty: 20 years in prison + $250,000 fine copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * denial-of-service attacks definition attacks that consume scarce resources defensive measures distributed denial-of-service attacks …

Want to read more?

Download all 33 pages for free via Telegram.

Download full file

About "computer crime"

powerpoint presentation computer crime computer and network security hojikamolov muhriddin * copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * identity theft background history and role of the social security number debate over a national id card real id act copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * background identity theft: misuse of another person’s identity to take actions permitted the owner credit card fraud #1 type of identity theft ease of opening accounts contributes to problem 10 million victims in 2004 alone average loss: $5,000 copyright © 2006 pearson education, inc. publishing as pearson addison-wesley slide 4- * gaining access to information mailboxes lost or stolen wallets dumpster diving ...

This file contains 33 pages in PPT format (275.0 KB). To download "computer crime", click the Telegram button on the left.

Tags: computer crime PPT 33 pages Free download Telegram