8 - Computer Security

8 - Computer Security - Comput er Secur it y and Risks...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security and Risks Slide 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Crime Computer Crime Computers are used to break laws as well as to uphold them. Computer crime involves: Theft by computer Software piracy Software sabotage Hacking and electronic trespassing Slide 2
Background image of page 2
Computer Crime Computer Crime Computer crime is any crime accomplished through knowledge or use of computer technology. Businesses and government institutions lose billions of dollars every year to computer criminals. The majority of crimes committed by company insiders. These crimes are typically covered up or not reported to authorities to avoid embarrassment. Slide 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Crime & I ntellectual Computer Crime & I ntellectual Property Property United States Department of Justice United States Department of Justice http://www.cybercrime.gov/ http://www.cybercrime.gov/ Sample of Recent Computer Crime: Father and Son team sentenced to prison for selling pirated software (October 29, 2010) IT Director sentenced for hacking former employer’s website (October 29, 2010) Man pleads guilty to purchasing, selling and using stolen credit card information (September 1, 2010) Slide 4
Background image of page 4
Purdue Cyber Forensics Lab Purdue Cyber Forensics Lab http://cyberforensics.purdue.edu/ http://cyberforensics.purdue.edu/ Mission To act as a National Lab for providing Cyber Forensics in Investigative Support Four communities involved in the emerging scientific discipline of Digital Forensic Sciences/ Cyber Forensics Law Enforcement Military Private Sector Academia Slid e 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Common types of computer Common types of computer crime crime Spoofing impersonating a person/company/website in order to steal information or pass along malware.
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/09/2011 for the course CNIT 136 taught by Professor Chad during the Spring '11 term at Purdue.

Page1 / 19

8 - Computer Security - Comput er Secur it y and Risks...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online