09_Computer_Crime

09_Computer_Crime - Econ 185 Lecture 09 Computer Crime Econ...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Econ 185 Lecture 09 Computer Crime 1 Econ 185 Glenn Owen UC Santa Barbara ` Computer crime, abuse, and fraud ` Computer crime legislation ` Mitigating computer crime ` Computer crime in 2007 ` Case examples 2 ` Computer crime involves the manipulation of a computer or computer data, by whatever method, to dishonestly obtain money, property, or some other advantage of value, or to cause loss. ` Computer abuse is the unauthorized use of or Computer abuse is the unauthorized use of, or access to, a computer for purposes contrary to the wishes of the owner of the computer. ` Computer fraud is the use of a computer to commit (1) fraudulent financial reporting and (2) misappropriation of assets
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Econ 185 Lecture 09 Computer Crime 2 ` Unauthorized theft, use, access, modification, copying, or distribution of software or data. ` Theft of money by altering computer records or theft of computer crime. Intent to illegally obtain information or tangible ` Intent to illegally obtain information or tangible property through the use of computers. ` Use or the conspiracy to use computer resources to commit a felony. ` Theft, vandalism, or destruction of computer hardware. ` Trafficking in passwords or other login information for accessing a computer. Extortion that uses a computer system as a target ` Extortion that uses a computer system as a target. ` Enlist top management support ` Increase employee awareness and education ` Survey security policies and protect passwords Firewalls Antivirus software Intrusion detection systems Access control lists Encryption Intrusion prevention systems Biometrics ` Implement controls
Background image of page 2
Econ 185 Lecture 09 Computer Crime 3 ` Indian Hackers " Pump and Dump " Scheme
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

09_Computer_Crime - Econ 185 Lecture 09 Computer Crime Econ...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online