computer crime university of palestine university of palestine eng. wisam zaqoot eng. wisam zaqoot...
TRANSCRIPT
Computer crimeComputer crime
University of PalestineUniversity of Palestine Eng. Wisam ZaqootEng. Wisam Zaqoot March 2011March 2011
ITSS 4201 Internet Insurance and ITSS 4201 Internet Insurance and Information HidingInformation Hiding
Computer crimeComputer crime
Different Different conceptsconcepts appeared, for example: appeared, for example: Hacking Hacking Fraud Fraud خداعخداع Embezzlement Embezzlement اختالساختالس SabotageSabotage التخريبالتخريب Identity Theft Identity Theft ForgeryForgery التزييفالتزييف Denial of Service Denial of Service VirusesViruses Piracy of copyrighted materialsPiracy of copyrighted materials
What is a computer crime?What is a computer crime?
Some people believe that there is nothing Some people believe that there is nothing special about crimes that involve special about crimes that involve computers, and there is no need to have the computers, and there is no need to have the concept “Computer crime”. What do you concept “Computer crime”. What do you think?think?
There have been times that it was thought There have been times that it was thought any crime involving a computer was a any crime involving a computer was a computer crime computer crime
Is a murder involving the use of a scalpel Is a murder involving the use of a scalpel automatically an issue in medical ethics just automatically an issue in medical ethics just because a medical instrument was used?because a medical instrument was used?
What is a computer crimeWhat is a computer crime?? Computer crime is : “ a criminal act that Computer crime is : “ a criminal act that
can be carried out only through the use of can be carried out only through the use of computer technology”computer technology”
With this, the theft of a computer With this, the theft of a computer hardware device (printer), theft of an hardware device (printer), theft of an automobile full of microprocessors would automobile full of microprocessors would not be a computer crime b/c the computer not be a computer crime b/c the computer is not the principal tool for carrying out the is not the principal tool for carrying out the crimecrime
Similarly, breaking into the computer lab, Similarly, breaking into the computer lab, vandalizing a computer system in the lab, vandalizing a computer system in the lab, these three examples are not computer these three examples are not computer crimes using this definitioncrimes using this definition
Quick History of Computer CrimesQuick History of Computer Crimes
Phase One: The early yearsPhase One: The early years 1960s and 1970s.1960s and 1970s. Originally, Originally, hackerhacker referred to a creative referred to a creative
programmer wrote clever code.programmer wrote clever code. The first operating systems and computer The first operating systems and computer
games were written by hackers.games were written by hackers. The term hacking was a positive term.The term hacking was a positive term. Hackers were usually high-school and Hackers were usually high-school and
college students.college students.
Quick History of Computer CrimesQuick History of Computer Crimes
Phase Two: Hacking takes on a more Phase Two: Hacking takes on a more negative meaning.negative meaning.
1970s through 1990s.1970s through 1990s. Authors and the media used the term hacker Authors and the media used the term hacker
to describe someone who used computers, to describe someone who used computers, without authorization, sometimes to commit without authorization, sometimes to commit crimes.crimes.
Early computer crimes were launched Early computer crimes were launched against business and government against business and government computers.computers.
Quick History of Computer CrimesQuick History of Computer Crimes
Phase Three: The Web EraPhase Three: The Web Era Beginning in the mid-1990s.Beginning in the mid-1990s. The increased use of the Internet for school, work, The increased use of the Internet for school, work,
business transactions, and recreation makes it business transactions, and recreation makes it attractive to criminals with basic computer skills.attractive to criminals with basic computer skills.
Crimes include the release of malicious code (viruses Crimes include the release of malicious code (viruses and worms).and worms).
Unprotected computers can be used, unsuspectingly, Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud.to accomplish network disruption or commit fraud.
Hackers with minimal computer skills can Hackers with minimal computer skills can create a lot of damage by using malicious create a lot of damage by using malicious code written by others. code written by others.
HactivismHactivism::
Hactivism is the use of hacking Hactivism is the use of hacking expertise to promote a political cause.expertise to promote a political cause.
This kind of hacking can range from mild to This kind of hacking can range from mild to destructive activities.destructive activities.
Some consider hactivism as modern-age civil Some consider hactivism as modern-age civil disobedience.disobedience.
Others believe hactivism denies others their Others believe hactivism denies others their freedom of speech and violates property freedom of speech and violates property rights.rights.
Do you think that hactivism is ethical?Do you think that hactivism is ethical?
TodayToday : :
Far fewer individuals and Far fewer individuals and organizations are sympathetic to the organizations are sympathetic to the causes of computer hackerscauses of computer hackers Why? Possibly the growing dependence Why? Possibly the growing dependence
of citizens on the Internetof citizens on the Internet A growing concern that cyberspace A growing concern that cyberspace
must become more secure and that must become more secure and that hacking should not be tolerated hacking should not be tolerated
Questions About PenaltiesQuestions About Penalties
IntentIntent Should hackers who did not intend to do Should hackers who did not intend to do
damage or harm be punished differently than damage or harm be punished differently than those with criminal intentions?those with criminal intentions?
AgeAge Should underage hackers receive a different Should underage hackers receive a different
penalty than adult hackers?penalty than adult hackers?
Damage DoneDamage Done Should the penalty correspond to the actual Should the penalty correspond to the actual
damage done or the potential for damage?damage done or the potential for damage?
Security can be improved bySecurity can be improved by::
Ongoing education and training to Ongoing education and training to recognize the risks.recognize the risks.
Better system design.Better system design.Use of security tools and systems.Use of security tools and systems.Challenging “others” to find flaws Challenging “others” to find flaws in systems.in systems.
Writing and enforcing laws that Writing and enforcing laws that don’t impede research and don’t impede research and advancement.advancement.