computer crimes and ethics

Upload: bhushan-zinzuvadiya

Post on 05-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Computer Crimes and Ethics

    1/16

    CSE 001c 1

    Computer Crimesand Ethics

    By: Nitesh Verma

    Btech Hons MBA ITSection 150Roll No. 14

    www.powerpointpresentationon.blogspot.com

  • 8/2/2019 Computer Crimes and Ethics

    2/16

    CSE 001c 2

    Topics of Discussion

    Introduction

    What are Computer Crimes and Ethics

    Types of Computer Crime Information Systems and TechnologyVulnerabilities

    Ways to Manage the Risks Associatedwith Vulnerabilities

    Can we trust Computers?

  • 8/2/2019 Computer Crimes and Ethics

    3/16

    CSE 001c 3

    Introduction

    With the popularization of the Internet, interestin computer crime, ethics, and privacy has

    gained momentum.

    News items describe about identity theft, creditcards numbers posted on chat rooms, and child

    pornography web sites. Computer information systems are vulnerable to

    physical attacks, electronic hacking, and naturaldisasters.

  • 8/2/2019 Computer Crimes and Ethics

    4/16

    CSE 001c 4

    What areComputer Crimes

    CRIMES

    Computer crime, cyber crime, e-crime, hi-tech

    crime or electronic crime generally refers tocriminal activity where a computer or network is the

    source, tool, target, or place of a crime.

  • 8/2/2019 Computer Crimes and Ethics

    5/16

    CSE 001c 5

    ETHICS

    Computer ethics is a branch of practicalphilosophy which deals with how computingprofessionals should make decisions regarding

    professional and social conduct.

  • 8/2/2019 Computer Crimes and Ethics

    6/16

    CSE 001c 6

    Theft

    Fraud

    Copyright InfringementAttacks on organizations and

    individuals.

    Types of computer crimes

  • 8/2/2019 Computer Crimes and Ethics

    7/16

    CSE 001c 7

    Fraud

    CopyrightInfringement

    Attacks onorganizations

    Theft

    ComputerCrimes

  • 8/2/2019 Computer Crimes and Ethics

    8/16

    CSE 001c 8

    Information Systems and

    Technology VulnerabilitiesViruses

    Worms

    Trojan Horse

    Time Bomb

    Logic Bomb Trapdoor

  • 8/2/2019 Computer Crimes and Ethics

    9/16

    CSE 001c 9

    Worms

    TrojanHorse

    TimeBomb

    LogicBomb

    Trapdoor

    Viruses

    IS andTV

  • 8/2/2019 Computer Crimes and Ethics

    10/16

    CSE 001c 10

    Ways to Manage the Risks

    Associated with Vulnerabilities Managing the risk of computer crime.

    Managing the risk of fraud.

    Managing the risk of copyrightinfringement.

    Managing the risk of technologyvulnerabilities.

  • 8/2/2019 Computer Crimes and Ethics

    11/16

    CSE 001c 11

    Managing:

    Risk ofcomputer

    crimeRisk of fraud

    Risk ofcopyright

    infringement

    Risk oftechnology

    vulnerabilities

  • 8/2/2019 Computer Crimes and Ethics

    12/16

    CSE 001c 12

    Firewalls

    To establish a barrier between the business

    computer systems and the outside world. The usual implementation of a firewall is to place a

    barrier between a computer system and theInternet.

    It is a combination of hardware and software or itmay be software only.

    Firewall filters or restricts internal or external accessto the systems.

  • 8/2/2019 Computer Crimes and Ethics

    13/16

    CSE 001c 13

    Anti-Virus Software and

    Updates

    Antivirus software is a software basically used toremove malicious files and viruses.

    Virus protection software must be kept update asnew viruses are developed on what seems like adaily basis.

    Some businesses have policies that limitacceptance of attachments to e-mails, prohibit theuse of disks prepared on non-business systems,and restrict downloading files from the Internet

    from trusted sites only.

  • 8/2/2019 Computer Crimes and Ethics

    14/16

    CSE 001c 14

    Can we trust computers

    Nationwide telephone service in US was disrupted for ninehours in 1990 because of a software error.

    U.S. Kane Carpet Company went out of business due

    to a bad computerized inventory control system. Denver Airport computer-controlled luggage system was

    closed for 2 years about $700 million lost. The Therac-25 software-controlled radiation

    machine killed three and injured several in 1985-87.

    Why?Lack of testing, honesty, ethics

  • 8/2/2019 Computer Crimes and Ethics

    15/16

    CSE 001c 15

    CONCLUSION

    Risks can be managed in informationsystems environments.

    Security is an illusion as any system canbe attacked under the right circumstances.

    The greatest hazard is to be complacent.(i.e. to be self satisfied).

  • 8/2/2019 Computer Crimes and Ethics

    16/16

    CSE 001c 16

    Thank You