The Computer as a Tool to Commit
Crime
 Social engineering
 E.g. pre-texting, phishing (email)
 Dumpster diving
 To get sensitive personal information such as address,
password, credit card numbers, etc.
 Identity theft
 Cyberterrorism
Computers as Objects of Crime
 Illegal access and use
 Hackers
 Crackers
 Information and equipment theft
 Software and Internet piracy
 Computer-related scams
 International computer crime
                
              
                                            
                                
            
                       
            
                 17 trang
17 trang | 
Chia sẻ: thanhle95 | Lượt xem: 787 | Lượt tải: 2 
              
            Bạn đang xem nội dung tài liệu Bài giảng Mạng máy tính 1 - Lecture 14: Computer Crime - Phạm Trần Vũ, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Computer Crime
1
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Number of Incidents Reported to Computer 
Emergency Response Team (CERT)
2
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Computer Crime and Security Survey
3
CuuDuongThanCong.com https://fb.com/tailieudientucntt
The Computer as a Tool to Commit 
Crime
 Social engineering
 E.g. pre-texting, phishing (email)
 Dumpster diving
 To get sensitive personal information such as address, 
password, credit card numbers, etc.
 Identity theft
 Cyberterrorism
4
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Computers as Objects of Crime
 Illegal access and use
 Hackers 
 Crackers
 Information and equipment theft
 Software and Internet piracy
 Computer-related scams
 International computer crime
5
CuuDuongThanCong.com https://fb.com/tailieudientucntt
How to Respond to a Security Incident
6
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Data Alteration and Destruction
 Virus
 Worm
 Logic bomb
 Trojan horse
7
CuuDuongThanCong.com https://fb.com/tailieudientucntt
The Six Computer Incidents with the Greatest 
Worldwide Economic Impact
8
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Top Viruses – July 2002
9
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Computer-Related Crime
 Crime prevention by state and federal 
agencies
 Crime prevention by corporations
 Public Key Infrastructure (PKI)
 Biometrics
 Anti-virus programs
10
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Computer-Related Crime
 Intrusion Detection Software
 Managed Security Service Providers 
(MSSPs)
 Internet Laws for Libel and Protection of 
Decency
11
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Crime on the Internet
 Develop effective Internet and security 
policies
 Use a stand-alone firewall with network 
monitoring capabilities
 Monitor managers and employees
 Use Internet security specialists to perform 
audits
12
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Common Methods Used to Commit 
Computer Crimes
13
CuuDuongThanCong.com https://fb.com/tailieudientucntt
How to Protect Your Corporate Data from 
Hackers
14
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Internet Security Threads
 Viruses and hostile Web applications (e.g. 
Java Applets or ActiveX controls)
 Trojan horses
 Adware and spyware
 Spam emails
 Identity theft and spoofing
 Social engineering
15
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Internet Security Measures
 Firewall
 Antivirus software
 Email encryption
 Encryption and authentication
 Frequent updates of software
 Always beware of incoming threads 
16
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Antivirus Software
 Symantec: Norton Antivirus, Norton Internet 
Security, etc.
 McAfee: McAfee Virus Scan, McAfee 
Internet Security, etc
 Kaspersky
 Bit defender
 BKAV
  17
CuuDuongThanCong.com https://fb.com/tailieudientucntt