计算机犯罪与职业道德课件_第1页
计算机犯罪与职业道德课件_第2页
计算机犯罪与职业道德课件_第3页
计算机犯罪与职业道德课件_第4页
计算机犯罪与职业道德课件_第5页
已阅读5页,还剩37页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

计算机犯罪与职业道德ComputerCrimeIntroductionHackingOnlineScamsFraud,Embezzlement,Sabotage,InformationTheft,andForgeryCrimeFightingVersusPrivacyandCivilLibertiesIntroductionComputersAreToolsComputersassistusinourwork,expandourthinking,andprovideentertainment.ComputersAreUsedtoCommitCrimesPreventing,detecting,andprosecutingcomputercrimeisachallenge.HackingThePhasesofHackingPhaseOne:Theearlyyears1960sand1970s.Originally,hackerreferredtoacreativeprogrammerwroteclevercode.Thefirstoperatingsystemsandcomputergameswerewrittenbyhackers.Thetermhackingwasapositiveterm.Hackerswereusuallyhigh-schoolandcollegestudents.Q:Describeamodern-dayversionof“clever”hacks.HackingThePhasesofHacking(cont’d)PhaseTwo:Hackingtakesonamorenegativemeaning.1970sthrough1990s.Authorsandthemediausedthetermhackertodescribesomeonewhousedcomputers,withoutauthorization,sometimestocommitcrimes.Earlycomputercrimeswerelaunchedagainstbusinessandgovernmentcomputers.Adultcriminalsbeganusingcomputerstocommittheircrimes.Q:DistinguishbetweenthehackingdonebyKevinMitnickandRobertJ.Morris.HackingThePhasesofHackingPhaseThree:TheWebEraBeginninginthemid-1990s.TheincreaseduseoftheInternetforschool,work,businesstransactions,andrecreationmakesitattractivetocriminalswithbasiccomputerskills.Crimesincludethereleaseofmaliciouscode(virusesandworms).Unprotectedcomputerscanbeused,unsuspectingly,toaccomplishnetworkdisruptionorcommitfraud.Q:Whyaredenial-of-serviceattacksdifficulttoprevent?HackingHactivism…istheuseofhackingexpertisetopromoteapoliticalcause.Thiskindofhackingcanrangefrommildtodestructiveactivities.Someconsiderhactivismasmodern-agecivildisobedience.Othersbelievehactivismdeniesotherstheirfreedomofspeechandviolatespropertyrights.Q:Arguethecasethathactivismisethical.HackingTheLawComputerFraudandAbuseAct(CFAA,1986)Itisacrimetoaccess,alter,damage,ordestroyinformationonacomputerwithoutauthorization.Computersprotectedunderthislawinclude:governmentcomputers,financialsystems,medicalsystems,interstatecommerce,andanycomputerontheInternet.Q:Isyourpersonalcomputerprotectedunderthislaw?HackingTheLaw(cont’d)USAPatriotAct(USAPA,2001)AmendstheCFAA.Allowsforrecoveryoflossesduetorespondingtoahackerattack,assessingdamages,andrestoringsystems.Higherpenaltiescanbeleviedagainstanyonehackingintocomputersbelongingtocriminaljusticesystemorthemilitary.Thegovernmentcanmonitoronlineactivitywithoutacourtorder.Q:Areanti-hackinglawsadequate?HackingCatchingHackers…requireslawenforcementtorecognizeandrespondtomyriadhackingattacks.Computerforensicstoolsmayinclude:Undercoveragents,Honeypots(stingoperationsincyberspace),Archivesofonlinemessageboards,Toolsforrecoveringdeletedorcodedinformation.Computerforensicsagenciesandservicesinclude:siteandtelephonelogs,etc..Q:Whatcomputerforensicstoolsoragencieshavebeeninthenewslately?HackingQuestionsAboutPenaltiesIntentShouldhackerswhodidnotintendtododamageorharmbepunisheddifferentlythanthosewithcriminalintentions?AgeShouldunderagehackersreceiveadifferentpenaltythanadulthackers?DamageDoneShouldthepenaltycorrespondtotheactualdamagedoneorthepotentialfordamage?HackingSecuritySecurityweaknessescanbefoundinthecomputersystemsusedby:businesses,government(classifiedandunclassified),andpersonalcomputers.Causesofsecurityweakness:characteristicsoftheInternetandWeb,humannature,inherentcomplexityofcomputersystems.Q:Howsecureisyourcomputerathome?Atwork?HackingSecuritycanbeimprovedby:Ongoingeducationandtrainingtorecognizetherisks.Bettersystemdesign.Useofsecuritytoolsandsystems.Challenging“others”tofindflawsinsystems.Writingandenforcinglawsthatdon’tstymieresearchandadvancement.Q:Doesweaksecurityjustifyintrusion?OnlineScamsAuctionsSellingandbuyinggoodsonlinehasbecomepopular.Problems:sellersdon’tsendthegoods,sellerssendinferiorgoods,priceisdrivenupbyshillbidding,andillegalgoodssold.Solutions:educatecustomers,Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeCausesofFraudCredit-CardStolenreceipts,mailednotices,andcards.Interceptionofonlinetransactionorweake-commercesecurity.Carelesshandlingbycard-owner.ATMStolenaccountnumbersandPINs.Insiderknowledge.AcounterfeitATM.TelecommunicationsStolenlong-distancePINs.Clonedphones.Q:Whatisthelegaldefinitionoffraud?Embezzlement?Sabotage?Theft?Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeDefensesAgainstFraudCredit-CardInstantcredit-cardcheck.Analysisofbuyingpatterns.Analysisofcreditcardapplications(todetectidentitytheft).VerifyuserwithCallerID.ATMRedesignedATMs.Limitedwithdrawal.Telecommunicationsmatchphone“signature”withserialnumber.identifyphonewithoutbroadcastingserialnumber.Q:Identifyabusiness’defenseagainstfraudthatyouhavewitnessed.Fraud,Embezzlement,Sabotage,IdentityTheft,andForgeryForgerySomeCausesPowerfulcomputersanddigitalmanipulationsoftware.High-qualityprinters,copiers,andscanners.SomeDefensesEducateconsumersandemployees.Useanti-counterfeitingtechniquesduringproduction.Usecounterfeitdetectionmethods.Createlegalandproceduralincentivestoimprovesecurity.Q:Howwouldyoueducateyourpeersabouttherisksofdigitalforgery?Aparent?Achild?CrimeFightingvs

PrivacyandCivilLibertiesScamsCrimeFightingAutomatedsurveillancesoftwaretolookforsuspiciousWebactivity.PrivacyandCivilLibertiesNosearchwarrantnorproofofprobablecause.BiometricsCrimeFightingExactmatchofbiologicalcharacteristicstoauniqueperson.PrivacyandCivilLibertiesEasytobuildcompletedossieronpeople.Q:Howmuchofyourprivacyandcivillibertiesareyouwillingtogiveupinordertoallowlawenforcementtobetterfightcomputercrime?CrimeFightingvs

PrivacyandCivilLibertiesSearchandSeizureofComputersCrimeFightingObtainevidenceofacrime.PrivacyandCivilLibertiesDay-to-daybusinessceases;non-criminalcontactwithothersends.TheCybercrimeTreatyCrimeFightingU.S.andEuropeangovernmentsagreetocooperatewithinvestigations.PrivacyandCivilLibertiesPotentialforgovernmentspyingisgreat.Q:MighttherebeincriminatingdatastoredaboutyouinthelogsofyourISP?Currentsituation

ofcybercrimeinChina

ThedevelopmentofInternetAcowwaslostinJan14th2003.Ifyouknowwhereitis,pleasecontactwithme.MyQQnumberis87881405.

QQisoneofthemostpopularIMinChina.NumberofcasesAgeoftheoffendersComputerCrimeVsComputerfacilitatedcrimeMajorcategoriesof

cyberfacilitatedcrimeHackingcase:HOW?

MajorcategoriesofintrusiontechnologyusedbyhackersinthecasesweinvestigatedHackingcase:HOW?ThefollowingintrusionmethodsincreasedrapidlyinrecentyearandbecameoneofthemajorintrusiontechnologyLarge-scaleintrusionbyexploitingvulnerabilityofclientsoftwareLarge-scaleintrusionbydecoyinguserstoinstallmaliciouscodethroughP2P,IM,EmailnetworkCaseexampleAvirusonQQ(amostpopularIM)werecreatedtospreadmalwareinordertocreatanIRCbotnet:60,000hostswereinfected.“Pleasevisit”WHowdidthecriminal(“hackers”)occupythevictimhosts?Thosewhodon’tknowalotabouttechnologymakeprofitbydamagethenetworksecuritydirectly.Thosewhoknowtechnologymakeprofitbysellingtechnology.“Hacking”withoutknowledgeoftechnology

Caseexample:NetbankaccountsstealingCaseoutline:InAugust,amaliciouscodewerewidelydistributedandmorethan300Netbankaccountswerestolen.Thesuspectintrudedintoawebsiteandputmaliciouscodeonthemainwebpage.Whenusersbrowsingthewebsite,themaliciouscodewillbeinstalledautomaticallyontotheuser’shosts.ThemaliciouscodewillstealallkindofNetbankaccountsandpostontoanotherwebsitehackedbythesuspect.However:Thesuspectknownothingabouthackingtechnology.Thesuspectboughtthemaliciouscodeandvictimwebsitestotallyfromotherhackers.Thesuspectonlyworkingstepbystepaccordingtothemanualprovidedbyotherhackers.Hackingcases:WHY?Hackingcases:WHERE?

HowdidtheyconnectedtoInternet?Mobile/Wirelesscrimeincreasedatthesametime.Hackingcases:TARGET?Personalcomputersbecomethemajorpartofvictimincomputercrimeinrecentyear.“Preference”ofhackersSmalldamageLessprofit.(Newbie)SeveredamageLessprofit.(Exploitbuyer)SmallDamageMoreProfit(Experiencedhacker)SeveredamageMoreprofit.(Almostnone)DamagetoInternetSecurityProfitWhydidtheybecomecriminal?Theythink:It’snotacrime,it’sjustagame.AlotofpeopledoitonInternet,soIcandoit.Iknowit’sacrime,butIneedmoney.Icanhidemyselfverywell.Noonewillinvestigateit.WhatwelearnfromthesedataComputercrimeandtraditionalcrimeareinterminglewitheachother.XSSvulnerabilitywithphishingDDOS/IRCbotnetwithextortion…Currentprotectiontechnologyhavenotsuccessfullyprotectagainstfollowingattackyet.SqlinjectionXSSDistributemalwareoverP2P/IMnetworkSocialengineering…WhatwelearnfromthesedataThosewhodon’tknowalotoftechnologycausemostofthedamagetoInternetdirectly.Theirmajoraimistomakeprofitbystealingidentity,Netbankaccount,onlinestockaccount,onlinegameaccountetc.Mostofthemdon’trealizedthatthereactivitycauseseveredamagetoInternetsecurity.WhatwelearnfromthesedataExploit/Maliciouscodesellerisoneofthemostbigthreattocybersecurity.Investigationofexploitandmaliciouscodeshouldbeemphasizedbycyberpolice.Personalcomputerisbecomingthemajortargetofcomputercrime.Antivirussoftwarewillplayamoreimportantroleincyberprotection.Howcananti-virusindustryhelpcyberpolice?Reporttopoliceauthoritybeforepublishingthedetailinformationaboutthemalcode/virusWehaveinvestigatethesourceofseveralvirusthisyear.However,thedetailinformationabouttheviruswerepublishedandthesuspectneveraccesstherelatednetworkresourceanymore.Ifyoureportingtousbeforehand,thesourceofmostidentitystealingma

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论