




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領
文檔簡介
計算機犯罪與職業(yè)道德ComputerCrimeIntroductionHackingOnlineScamsFraud,Embezzlement,Sabotage,InformationTheft,andForgeryCrimeFightingVersusPrivacyandCivilLibertiesIntroductionComputersAreToolsComputersassistusinourwork,expandourthinking,andprovideentertainment.ComputersAreUsedtoCommitCrimesPreventing,detecting,andprosecutingcomputercrimeisachallenge.HackingThePhasesofHackingPhaseOne:Theearlyyears1960sand1970s.Originally,hackerreferredtoacreativeprogrammerwroteclevercode.Thefirstoperatingsystemsandcomputergameswerewrittenbyhackers.Thetermhackingwasapositiveterm.Hackerswereusuallyhigh-schoolandcollegestudents.Q:Describeamodern-dayversionof“clever”hacks.HackingThePhasesofHacking(cont’d)PhaseTwo:Hackingtakesonamorenegativemeaning.1970sthrough1990s.Authorsandthemediausedthetermhackertodescribesomeonewhousedcomputers,withoutauthorization,sometimestocommitcrimes.Earlycomputercrimeswerelaunchedagainstbusinessandgovernmentcomputers.Adultcriminalsbeganusingcomputerstocommittheircrimes.Q:DistinguishbetweenthehackingdonebyKevinMitnickandRobertJ.Morris.HackingThePhasesofHackingPhaseThree:TheWebEraBeginninginthemid-1990s.TheincreaseduseoftheInternetforschool,work,businesstransactions,andrecreationmakesitattractivetocriminalswithbasiccomputerskills.Crimesincludethereleaseofmaliciouscode(virusesandworms).Unprotectedcomputerscanbeused,unsuspectingly,toaccomplishnetworkdisruptionorcommitfraud.Q:Whyaredenial-of-serviceattacksdifficulttoprevent?HackingHactivism…istheuseofhackingexpertisetopromoteapoliticalcause.Thiskindofhackingcanrangefrommildtodestructiveactivities.Someconsiderhactivismasmodern-agecivildisobedience.Othersbelievehactivismdeniesotherstheirfreedomofspeechandviolatespropertyrights.Q:Arguethecasethathactivismisethical.HackingTheLawComputerFraudandAbuseAct(CFAA,1986)Itisacrimetoaccess,alter,damage,ordestroyinformationonacomputerwithoutauthorization.Computersprotectedunderthislawinclude:governmentcomputers,financialsystems,medicalsystems,interstatecommerce,andanycomputerontheInternet.Q:Isyourpersonalcomputerprotectedunderthislaw?HackingTheLaw(cont’d)USAPatriotAct(USAPA,2001)AmendstheCFAA.Allowsforrecoveryoflossesduetorespondingtoahackerattack,assessingdamages,andrestoringsystems.Higherpenaltiescanbeleviedagainstanyonehackingintocomputersbelongingtocriminaljusticesystemorthemilitary.Thegovernmentcanmonitoronlineactivitywithoutacourtorder.Q:Areanti-hackinglawsadequate?HackingCatchingHackers…requireslawenforcementtorecognizeandrespondtomyriadhackingattacks.Computerforensicstoolsmayinclude:Undercoveragents,Honeypots(stingoperationsincyberspace),Archivesofonlinemessageboards,Toolsforrecoveringdeletedorcodedinformation.Computerforensicsagenciesandservicesinclude:siteandtelephonelogs,etc..Q:Whatcomputerforensicstoolsoragencieshavebeeninthenewslately?HackingQuestionsAboutPenaltiesIntentShouldhackerswhodidnotintendtododamageorharmbepunisheddifferentlythanthosewithcriminalintentions?AgeShouldunderagehackersreceiveadifferentpenaltythanadulthackers?DamageDoneShouldthepenaltycorrespondtotheactualdamagedoneorthepotentialfordamage?HackingSecuritySecurityweaknessescanbefoundinthecomputersystemsusedby:businesses,government(classifiedandunclassified),andpersonalcomputers.Causesofsecurityweakness:characteristicsoftheInternetandWeb,humannature,inherentcomplexityofcomputersystems.Q:Howsecureisyourcomputerathome?Atwork?HackingSecuritycanbeimprovedby:Ongoingeducationandtrainingtorecognizetherisks.Bettersystemdesign.Useofsecuritytoolsandsystems.Challenging“others”tofindflawsinsystems.Writingandenforcinglawsthatdon’tstymieresearchandadvancement.Q:Doesweaksecurityjustifyintrusion?OnlineScamsAuctionsSellingandbuyinggoodsonlinehasbecomepopular.Problems:sellersdon’tsendthegoods,sellerssendinferiorgoods,priceisdrivenupbyshillbidding,andillegalgoodssold.Solutions:educatecustomers,Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeCausesofFraudCredit-CardStolenreceipts,mailednotices,andcards.Interceptionofonlinetransactionorweake-commercesecurity.Carelesshandlingbycard-owner.ATMStolenaccountnumbersandPINs.Insiderknowledge.AcounterfeitATM.TelecommunicationsStolenlong-distancePINs.Clonedphones.Q:Whatisthelegaldefinitionoffraud?Embezzlement?Sabotage?Theft?Fraud,Embezzlement,Sabotage,IdentityTheft,andForgerySomeDefensesAgainstFraudCredit-CardInstantcredit-cardcheck.Analysisofbuyingpatterns.Analysisofcreditcardapplications(todetectidentitytheft).VerifyuserwithCallerID.ATMRedesignedATMs.Limitedwithdrawal.Telecommunicationsmatchphone“signature”withserialnumber.identifyphonewithoutbroadcastingserialnumber.Q:Identifyabusiness’defenseagainstfraudthatyouhavewitnessed.Fraud,Embezzlement,Sabotage,IdentityTheft,andForgeryForgerySomeCausesPowerfulcomputersanddigitalmanipulationsoftware.High-qualityprinters,copiers,andscanners.SomeDefensesEducateconsumersandemployees.Useanti-counterfeitingtechniquesduringproduction.Usecounterfeitdetectionmethods.Createlegalandproceduralincentivestoimprovesecurity.Q:Howwouldyoueducateyourpeersabouttherisksofdigitalforgery?Aparent?Achild?CrimeFightingvs
PrivacyandCivilLibertiesScamsCrimeFightingAutomatedsurveillancesoftwaretolookforsuspiciousWebactivity.PrivacyandCivilLibertiesNosearchwarrantnorproofofprobablecause.BiometricsCrimeFightingExactmatchofbiologicalcharacteristicstoauniqueperson.PrivacyandCivilLibertiesEasytobuildcompletedossieronpeople.Q:Howmuchofyourprivacyandcivillibertiesareyouwillingtogiveupinordertoallowlawenforcementtobetterfightcomputercrime?CrimeFightingvs
PrivacyandCivilLibertiesSearchandSeizureofComputersCrimeFightingObtainevidenceofacrime.PrivacyandCivilLibertiesDay-to-daybusinessceases;non-criminalcontactwithothersends.TheCybercrimeTreatyCrimeFightingU.S.andEuropeangovernmentsagreetocooperatewithinvestigations.PrivacyandCivilLibertiesPotentialforgovernmentspyingisgreat.Q:MighttherebeincriminatingdatastoredaboutyouinthelogsofyourISP?Currentsituation
ofcybercrimeinChina
ThedevelopmentofInternetAcowwaslostinJan14th2003.Ifyouknowwhereitis,pleasecontactwithme.MyQQnumberis87881405.
QQisoneofthemostpopularIMinChina.NumberofcasesAgeoftheoffendersComputerCrimeVsComputerfacilitatedcrimeMajorcategoriesof
cyberfacilitatedcrimeHackingcase:HOW?
MajorcategoriesofintrusiontechnologyusedbyhackersinthecasesweinvestigatedHackingcase:HOW?ThefollowingintrusionmethodsincreasedrapidlyinrecentyearandbecameoneofthemajorintrusiontechnologyLarge-scaleintrusionbyexploitingvulnerabilityofclientsoftwareLarge-scaleintrusionbydecoyinguserstoinstallmaliciouscodethroughP2P,IM,EmailnetworkCaseexampleAvirusonQQ(amostpopularIM)werecreatedtospreadmalwareinordertocreatanIRCbotnet:60,000hostswereinfected.“Pleasevisit”WHowdidthecriminal(“hackers”)occupythevictimhosts?Thosewhodon’tknowalotabouttechnologymakeprofitbydamagethenetworksecuritydirectly.Thosewhoknowtechnologymakeprofitbysellingtechnology.“Hacking”withoutknowledgeoftechnology
Caseexample:NetbankaccountsstealingCaseoutline:InAugust,amaliciouscodewerewidelydistributedandmorethan300Netbankaccountswerestolen.Thesuspectintrudedintoawebsiteandputmaliciouscodeonthemainwebpage.Whenusersbrowsingthewebsite,themaliciouscodewillbeinstalledautomaticallyontotheuser’shosts.ThemaliciouscodewillstealallkindofNetbankaccountsandpostontoanotherwebsitehackedbythesuspect.However:Thesuspectknownothingabouthackingtechnology.Thesuspectboughtthemaliciouscodeandvictimwebsitestotallyfromotherhackers.Thesuspectonlyworkingstepbystepaccordingtothemanualprovidedbyotherhackers.Hackingcases:WHY?Hackingcases:WHERE?
HowdidtheyconnectedtoInternet?Mobile/Wirelesscrimeincreasedatthesametime.Hackingcases:TARGET?Personalcomputersbecomethemajorpartofvictimincomputercrimeinrecentyear.“Preference”ofhackersSmalldamageLessprofit.(Newbie)SeveredamageLessprofit.(Exploitbuyer)SmallDamageMoreProfit(Experiencedhacker)SeveredamageMoreprofit.(Almostnone)DamagetoInternetSecurityProfitWhydidtheybecomecriminal?Theythink:It’snotacrime,it’sjustagame.AlotofpeopledoitonInternet,soIcandoit.Iknowit’sacrime,butIneedmoney.Icanhidemyselfverywell.Noonewillinvestigateit.WhatwelearnfromthesedataComputercrimeandtraditionalcrimeareinterminglewitheachother.XSSvulnerabilitywithphishingDDOS/IRCbotnetwithextortion…Currentprotectiontechnologyhavenotsuccessfullyprotectagainstfollowingattackyet.SqlinjectionXSSDistributemalwareoverP2P/IMnetworkSocialengineering…WhatwelearnfromthesedataThosewhodon’tknowalotoftechnologycausemostofthedamagetoInternetdirectly.Theirmajoraimistomakeprofitbystealingidentity,Netbankaccount,onlinestockaccount,onlinegameaccountetc.Mostofthemdon’trealizedthatthereactivitycauseseveredamagetoInternetsecurity.WhatwelearnfromthesedataExploit/Maliciouscodesellerisoneofthemostbigthreattocybersecurity.Investigationofexploitandmaliciouscodeshouldbeemphasizedbycyberpolice.Personalcomputerisbecomingthemajortargetofcomputercrime.Antivirussoftwarewillplayamoreimportantroleincyberprotection.Howcananti-virusindustryhelpcyberpolice?Reporttopoliceauthoritybeforepublishingthedetailinformationaboutthemalcode/virusWehaveinvestigatethesourceofseveralvirusthisyear.However,thedetailinformationabouttheviruswerepublishedandthesuspectneveraccesstherelatednetworkresourceanymore.Ifyoureportingtousbeforehand,thesourceofmostidentitystealingma
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 鱉甲生物活性物質(zhì)提取與應用-全面剖析
- 網(wǎng)絡文學的跨文化傳播研究-全面剖析
- 人工智能在技術(shù)咨詢中的應用-全面剖析
- 脈沖星量子重力輻射效應-全面剖析
- 非參數(shù)統(tǒng)計在社交網(wǎng)絡分析中的新趨勢-全面剖析
- 神經(jīng)肌肉電刺激技術(shù)-全面剖析
- 藥品質(zhì)量監(jiān)管與創(chuàng)新-全面剖析
- 能源效率提升策略-第4篇-全面剖析
- 高效配置腳本管理-全面剖析
- 健康大數(shù)據(jù)挖掘與疾病預警-全面剖析
- 病例分型標準
- LongleyRice無線電波傳輸模型
- 幕墻工程重要環(huán)境因素及采取的措施方案
- 我的家鄉(xiāng)煙臺課件
- 二級板式換熱器熱網(wǎng)疏水回收的優(yōu)勢
- 2021屆高考英語887核心詞(打印、詞頻、出處、例句、背誦)
- 國外幾家氣壓盤式制動器的比較
- 培養(yǎng)初中學生的數(shù)學閱讀理解能力
- 卒中相關(guān)肺炎的指南解讀
- 六下統(tǒng)編版復習2形近字
- 硒知識科普手冊
評論
0/150
提交評論