8/2/2019 Computer Crimes and Ethics
1/16
CSE 001c 1
Computer Crimesand Ethics
By: Nitesh Verma
Btech Hons MBA ITSection 150Roll No. 14
www.powerpointpresentationon.blogspot.com
8/2/2019 Computer Crimes and Ethics
2/16
CSE 001c 2
Topics of Discussion
Introduction
What are Computer Crimes and Ethics
Types of Computer Crime Information Systems and TechnologyVulnerabilities
Ways to Manage the Risks Associatedwith Vulnerabilities
Can we trust Computers?
8/2/2019 Computer Crimes and Ethics
3/16
CSE 001c 3
Introduction
With the popularization of the Internet, interestin computer crime, ethics, and privacy has
gained momentum.
News items describe about identity theft, creditcards numbers posted on chat rooms, and child
pornography web sites. Computer information systems are vulnerable to
physical attacks, electronic hacking, and naturaldisasters.
8/2/2019 Computer Crimes and Ethics
4/16
CSE 001c 4
What areComputer Crimes
CRIMES
Computer crime, cyber crime, e-crime, hi-tech
crime or electronic crime generally refers tocriminal activity where a computer or network is the
source, tool, target, or place of a crime.
8/2/2019 Computer Crimes and Ethics
5/16
CSE 001c 5
ETHICS
Computer ethics is a branch of practicalphilosophy which deals with how computingprofessionals should make decisions regarding
professional and social conduct.
8/2/2019 Computer Crimes and Ethics
6/16
CSE 001c 6
Theft
Fraud
Copyright InfringementAttacks on organizations and
individuals.
Types of computer crimes
8/2/2019 Computer Crimes and Ethics
7/16
CSE 001c 7
Fraud
CopyrightInfringement
Attacks onorganizations
Theft
ComputerCrimes
8/2/2019 Computer Crimes and Ethics
8/16
CSE 001c 8
Information Systems and
Technology VulnerabilitiesViruses
Worms
Trojan Horse
Time Bomb
Logic Bomb Trapdoor
8/2/2019 Computer Crimes and Ethics
9/16
CSE 001c 9
Worms
TrojanHorse
TimeBomb
LogicBomb
Trapdoor
Viruses
IS andTV
8/2/2019 Computer Crimes and Ethics
10/16
CSE 001c 10
Ways to Manage the Risks
Associated with Vulnerabilities Managing the risk of computer crime.
Managing the risk of fraud.
Managing the risk of copyrightinfringement.
Managing the risk of technologyvulnerabilities.
8/2/2019 Computer Crimes and Ethics
11/16
CSE 001c 11
Managing:
Risk ofcomputer
crimeRisk of fraud
Risk ofcopyright
infringement
Risk oftechnology
vulnerabilities
8/2/2019 Computer Crimes and Ethics
12/16
CSE 001c 12
Firewalls
To establish a barrier between the business
computer systems and the outside world. The usual implementation of a firewall is to place a
barrier between a computer system and theInternet.
It is a combination of hardware and software or itmay be software only.
Firewall filters or restricts internal or external accessto the systems.
8/2/2019 Computer Crimes and Ethics
13/16
CSE 001c 13
Anti-Virus Software and
Updates
Antivirus software is a software basically used toremove malicious files and viruses.
Virus protection software must be kept update asnew viruses are developed on what seems like adaily basis.
Some businesses have policies that limitacceptance of attachments to e-mails, prohibit theuse of disks prepared on non-business systems,and restrict downloading files from the Internet
from trusted sites only.
8/2/2019 Computer Crimes and Ethics
14/16
CSE 001c 14
Can we trust computers
Nationwide telephone service in US was disrupted for ninehours in 1990 because of a software error.
U.S. Kane Carpet Company went out of business due
to a bad computerized inventory control system. Denver Airport computer-controlled luggage system was
closed for 2 years about $700 million lost. The Therac-25 software-controlled radiation
machine killed three and injured several in 1985-87.
Why?Lack of testing, honesty, ethics
8/2/2019 Computer Crimes and Ethics
15/16
CSE 001c 15
CONCLUSION
Risks can be managed in informationsystems environments.
Security is an illusion as any system canbe attacked under the right circumstances.
The greatest hazard is to be complacent.(i.e. to be self satisfied).
8/2/2019 Computer Crimes and Ethics
16/16
CSE 001c 16
Thank You
Top Related