版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
计算机犯罪与职业道德ComputerCrimeIntroductionHackingOnlineScamsFraud,Embezzlement,Sabotage,InformationTheft,andForgeryCrimeFightingVersusPrivacyandCivilLibertiesIntroductionComputersAreToolsComputersassistusinourwork,expandourthinking,andprovideentertainment.ComputersAreUsedtoCommitCrimesPreventing,detecting,andprosecutingcomputercrimeisachallenge.HackingThePhasesofHackingPhaseOne:Theearlyyears1960sand1970s.Originally,hackerreferredtoacreativeprogrammerwroteclevercode.Thefirstoperatingsystemsandcomputergameswerewrittenbyhackers.Thetermhackingwasapositiveterm.Hackerswereusuallyhigh-schoolandcollegestudents.Q:Describeamodern-dayversionof“clever”hacks.HackingThePhasesofHacking(cont’d)PhaseTwo:Hackingtakesonamorenegativemeaning.1970sthrough1990s.Authorsandthemediausedthetermhackertodescribesomeonewhousedcomputers,withoutauthorization,sometimestocommitcrimes.Earlycomputercrimeswerelaunchedagainstbusinessandgovernmentcomputers.Adultcriminalsbeganusingcomputerstocommittheircrimes.Q:DistinguishbetweenthehackingdonebyKevinMitnickandRobertJ.Morris.HackingThePhasesofHackingPhaseThree:TheWebEraBeginninginthemid-1990s.TheincreaseduseoftheInternetforschool,work,businesstransactions,andrecreationmakesitattractivetocriminalswithbasiccomputerskills.Crimesincludethereleaseofmaliciouscode(virusesandworms).Unprotectedcomputerscanbeused,unsuspectingly,toaccomplishnetworkdisruptionorcommitfraud.Q:Whyaredenial-of-serviceattacksdifficulttoprevent?HackingHactivism…istheuseofhackingexpertisetopromoteapoliticalcause.Thiskindofhackingcanrangefrommildtodestructiveactivities.Someconsiderhactivismasmodern-agecivildisobedience.Othersbelievehactivismdeniesotherstheirfreedomofspeechandviolatespropertyrights.Q:Arguethecasethathactivismisethical.HackingTheLawComputerFraudandAbuseAct(CFAA,1986)Itisacrimetoaccess,alter,damage,ordestroyinformationonacomputerwithoutauthorization.Computersprotectedunderthislawinclude:governmentcomputers,financialsystems,medicalsystems,interstatecommerce,andanycomputerontheInternet.Q:Isyourpersonalcomputerprotectedunderthislaw?HackingTheLaw(cont’d)USAPatriotAct(USAPA,2001)AmendstheCFAA.Allowsforrecoveryoflossesduetorespondingtoahackerattack,assessingdamages,andrestoringsystems.Higherpenaltiescanbeleviedagainstanyonehackingintocomputersbelongingtocriminaljusticesystemorthemilitary.Thegovernmentcanmonitoronlineactivitywithoutacourtorder.Q:Areanti-hackinglawsadequate?HackingCatchingHackers…requireslawenforcementtorecognizeandrespondtomyriadhackingattacks.Computerforensicstoolsmayinclude:Undercoveragents,Honeypots(stingoperationsincyberspace),Archivesofonlinemessageboards,Toolsforrecoveringdeletedorcodedinformation.Computerforensicsagenciesandservicesinclude:siteandtelephonelogs,etc..Q:Whatcomputerforensicstoolsoragencieshavebeeninthenewslately?HackingQuestionsAboutPenaltiesIntentShouldhackerswhodidnotintendtododamageorharmbepunisheddifferentlythanthosewithcriminalintentions?AgeShouldunderagehackersreceiveadifferentpenaltythanadulthackers?DamageDoneShouldthepenaltycorrespondtotheactualdamagedoneorthepotentialfordamage?HackingSecuritySecurityweaknessescanbefoundinthecomputersystemsusedby:businesses,government(classifiedandunclassified),andpersonalcomputers.Causesofsecurityweakness:characteristicsoftheInternetandWeb,humannature,inherentcomplexityofcomputersystems.Q:Howsecureisyourcomputerathome?Atwork?HackingSecuritycanbeimprovedby:Ongoingeducationandtrainingtorecognizetherisks.Bettersystemdesign.Useofsecuritytoolsandsystems.Challenging“others”tofindflawsinsystems.Writingandenforcinglawsthatdon’tstymieresearchandadvancement.Q:Doesweaksecurityjustifyintrusion?OnlineScamsAuctionsSellingandbuyinggoodsonlinehasbecomepopular.Problems:sellersdon’tsendthegoods,sellerssendinferiorgoods,priceisdrivenupbyshillbidding,andillegalgoodssold.Solutions:educatecustomers,Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeCausesofFraudCredit-CardStolenreceipts,mailednotices,andcards.Interceptionofonlinetransactionorweake-commercesecurity.Carelesshandlingbycard-owner.ATMStolenaccountnumbersandPINs.Insiderknowledge.AcounterfeitATM.TelecommunicationsStolenlong-distancePINs.Clonedphones.Q:Whatisthelegaldefinitionoffraud?Embezzlement?Sabotage?Theft?Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeDefensesAgainstFraudCredit-CardInstantcredit-cardcheck.Analysisofbuyingpatterns.Analysisofcreditcardapplications(todetectidentitytheft).VerifyuserwithCallerID.ATMRedesignedATMs.Limitedwithdrawal.Telecommunicationsmatchphone“signature”withserialnumber.identifyphonewithoutbroadcastingserialnumber.Q:Identifyabusiness’defenseagainstfraudthatyouhavewitnessed.Fraud,Embezzlement,Sabotage,IdentityTheft,andForgeryForgerySomeCausesPowerfulcomputersanddigitalmanipulationsoftware.High-qualityprinters,copiers,andscanners.SomeDefensesEducateconsumersandemployees.Useanti-counterfeitingtechniquesduringproduction.Usecounterfeitdetectionmethods.Createlegalandproceduralincentivestoimprovesecurity.Q:Howwouldyoueducateyourpeersabouttherisksofdigitalforgery?Aparent?Achild?CrimeFightingvs
PrivacyandCivilLibertiesScamsCrimeFightingAutomatedsurveillancesoftwaretolookforsuspiciousWebactivity.PrivacyandCivilLibertiesNosearchwarrantnorproofofprobablecause.BiometricsCrimeFightingExactmatchofbiologicalcharacteristicstoauniqueperson.PrivacyandCivilLibertiesEasytobuildcompletedossieronpeople.Q:Howmuchofyourprivacyandcivillibertiesareyouwillingtogiveupinordertoallowlawenforcementtobetterfightcomputercrime?CrimeFightingvs
PrivacyandCivilLibertiesSearchandSeizureofComputersCrimeFightingObtainevidenceofacrime.PrivacyandCivilLibertiesDay-to-daybusinessceases;non-criminalcontactwithothersends.TheCybercrimeTreatyCrimeFightingU.S.andEuropeangovernmentsagreetocooperatewithinvestigations.PrivacyandCivilLibertiesPotentialforgovernmentspyingisgreat.Q:MighttherebeincriminatingdatastoredaboutyouinthelogsofyourISP?Currentsituation
ofcybercrimeinChina
ThedevelopmentofInternetAcowwaslostinJan14th2003.Ifyouknowwhereitis,pleasecontactwithme.MyQQnumberis87881405.
QQisoneofthemostpopularIMinChina.NumberofcasesAgeoftheoffendersComputerCrimeVsComputerfacilitatedcrimeMajorcategoriesof
cyberfacilitatedcrimeHackingcase:HOW?
MajorcategoriesofintrusiontechnologyusedbyhackersinthecasesweinvestigatedHackingcase:HOW?ThefollowingintrusionmethodsincreasedrapidlyinrecentyearandbecameoneofthemajorintrusiontechnologyLarge-scaleintrusionbyexploitingvulnerabilityofclientsoftwareLarge-scaleintrusionbydecoyinguserstoinstallmaliciouscodethroughP2P,IM,EmailnetworkCaseexampleAvirusonQQ(amostpopularIM)werecreatedtospreadmalwareinordertocreatanIRCbotnet:60,000hostswereinfected.“Pleasevisit”WHowdidthecriminal(“hackers”)occupythevictimhosts?Thosewhodon’tknowalotabouttechnologymakeprofitbydamagethenetworksecuritydirectly.Thosewhoknowtechnologymakeprofitbysellingtechnology.“Hacking”withoutknowledgeoftechnology
Caseexample:NetbankaccountsstealingCaseoutline:InAugust,amaliciouscodewerewidelydistributedandmorethan300Netbankaccountswerestolen.Thesuspectintrudedintoawebsiteandputmaliciouscodeonthemainwebpage.Whenusersbrowsingthewebsite,themaliciouscodewillbeinstalledautomaticallyontotheuser’shosts.ThemaliciouscodewillstealallkindofNetbankaccountsandpostontoanotherwebsitehackedbythesuspect.However:Thesuspectknownothingabouthackingtechnology.Thesuspectboughtthemaliciouscodeandvictimwebsitestotallyfromotherhackers.Thesuspectonlyworkingstepbystepaccordingtothemanualprovidedbyotherhackers.Hackingcases:WHY?Hackingcases:WHERE?
HowdidtheyconnectedtoInternet?Mobile/Wirelesscrimeincreasedatthesametime.Hackingcases:TARGET?Personalcomputersbecomethemajorpartofvictimincomputercrimeinrecentyear.“Preference”ofhackersSmalldamageLessprofit.(Newbie)SeveredamageLessprofit.(Exploitbuyer)SmallDamageMoreProfit(Experiencedhacker)SeveredamageMoreprofit.(Almostnone)DamagetoInternetSecurityProfitWhydidtheybecomecriminal?Theythink:It’snotacrime,it’sjustagame.AlotofpeopledoitonInternet,soIcandoit.Iknowit’sacrime,butIneedmoney.Icanhidemyselfverywell.Noonewillinvestigateit.WhatwelearnfromthesedataComputercrimeandtraditionalcrimeareinterminglewitheachother.XSSvulnerabilitywithphishingDDOS/IRCbotnetwithextortion…Currentprotectiontechnologyhavenotsuccessfullyprotectagainstfollowingattackyet.SqlinjectionXSSDistributemalwareoverP2P/IMnetworkSocialengineering…WhatwelearnfromthesedataThosewhodon’tknowalotoftechnologycausemostofthedamagetoInternetdirectly.Theirmajoraimistomakeprofitbystealingidentity,Netbankaccount,onlinestockaccount,onlinegameaccountetc.Mostofthemdon’trealizedthatthereactivitycauseseveredamagetoInternetsecurity.WhatwelearnfromthesedataExploit/Maliciouscodesellerisoneofthemostbigthreattocybersecurity.Investigationofexploitandmaliciouscodeshouldbeemphasizedbycyberpolice.Personalcomputerisbecomingthemajortargetofcomputercrime.Antivirussoftwarewillplayamoreimportantroleincyberprotection.Howcananti-virusindustryhelpcyberpolice?Reporttopoliceauthoritybeforepublishingthedetailinformationaboutthemalcode/virusWehaveinvestigatethesourceofseveralvirusthisyear.However,thedetailinformationabouttheviruswerepublishedandthesuspectneveraccesstherelatednetworkresourceanymore.Ifyoureportingtousbeforehand,thesourceofmostidentitystealingma
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 二零二五年度摄影师与摄影棚运营方居间合同2篇
- 二零二五版社区配送订餐服务合同范本与社区管理协议3篇
- 二零二五年度酒店地毯绿色生产与环保认证合同3篇
- 二零二五年新能源充电桩建设运营合同样本3篇
- 二零二五版高端住宅项目全程代理销售合同3篇
- 二零二五版基因合成与生物技术知识产权转让合同3篇
- 二零二五版10月大型设备运输委托合同2篇
- 二零二五版广西事业单位聘用示范性合同模板12篇
- 2025年度出口货物环保认证服务合同3篇
- 二零二五年度腻子材料国际贸易代理合同2篇
- 纳米技术增强早期疾病生物标志物的检测
- 产品销量分析表折线图excel模板
- 办公设备(电脑、一体机、投影机等)采购 投标方案(技术方案)
- 【真题】2023年南京市中考语文试卷(含答案解析)
- 功率模块可靠性寿命评估与预测
- 案卷评查培训课件模板
- 湘教版七年级地理第一学期期末试卷分析
- 上海春季高考英语真题试题word精校版(含答案)
- “数”我精彩-“学”有特色-小学六年级数学寒假特色作业展示
- 牛津译林版八年级上册英语8A期末复习-阅读理解(含答案)
- 普通高等新郎接亲试卷(2022全国卷)
评论
0/150
提交评论