The Computer as a Tool to Commit
Crime
Social engineering
E.g. pre-texting, phishing (email)
Dumpster diving
To get sensitive personal information such as address,
password, credit card numbers, etc.
Identity theft
Cyberterrorism
Computers as Objects of Crime
Illegal access and use
Hackers
Crackers
Information and equipment theft
Software and Internet piracy
Computer-related scams
International computer crime
17 trang |
Chia sẻ: thanhle95 | Lượt xem: 553 | Lượt tải: 2
Bạn đang xem nội dung tài liệu Bài giảng Mạng máy tính 1 - Lecture 14: Computer Crime - Phạm Trần Vũ, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Computer Crime
1
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Number of Incidents Reported to Computer
Emergency Response Team (CERT)
2
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Computer Crime and Security Survey
3
CuuDuongThanCong.com https://fb.com/tailieudientucntt
The Computer as a Tool to Commit
Crime
Social engineering
E.g. pre-texting, phishing (email)
Dumpster diving
To get sensitive personal information such as address,
password, credit card numbers, etc.
Identity theft
Cyberterrorism
4
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Computers as Objects of Crime
Illegal access and use
Hackers
Crackers
Information and equipment theft
Software and Internet piracy
Computer-related scams
International computer crime
5
CuuDuongThanCong.com https://fb.com/tailieudientucntt
How to Respond to a Security Incident
6
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Data Alteration and Destruction
Virus
Worm
Logic bomb
Trojan horse
7
CuuDuongThanCong.com https://fb.com/tailieudientucntt
The Six Computer Incidents with the Greatest
Worldwide Economic Impact
8
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Top Viruses – July 2002
9
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Computer-Related Crime
Crime prevention by state and federal
agencies
Crime prevention by corporations
Public Key Infrastructure (PKI)
Biometrics
Anti-virus programs
10
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Computer-Related Crime
Intrusion Detection Software
Managed Security Service Providers
(MSSPs)
Internet Laws for Libel and Protection of
Decency
11
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Preventing Crime on the Internet
Develop effective Internet and security
policies
Use a stand-alone firewall with network
monitoring capabilities
Monitor managers and employees
Use Internet security specialists to perform
audits
12
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Common Methods Used to Commit
Computer Crimes
13
CuuDuongThanCong.com https://fb.com/tailieudientucntt
How to Protect Your Corporate Data from
Hackers
14
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Internet Security Threads
Viruses and hostile Web applications (e.g.
Java Applets or ActiveX controls)
Trojan horses
Adware and spyware
Spam emails
Identity theft and spoofing
Social engineering
15
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Internet Security Measures
Firewall
Antivirus software
Email encryption
Encryption and authentication
Frequent updates of software
Always beware of incoming threads
16
CuuDuongThanCong.com https://fb.com/tailieudientucntt
Antivirus Software
Symantec: Norton Antivirus, Norton Internet
Security, etc.
McAfee: McAfee Virus Scan, McAfee
Internet Security, etc
Kaspersky
Bit defender
BKAV
17
CuuDuongThanCong.com https://fb.com/tailieudientucntt