computer crime university of palestine university of palestine eng. wisam zaqoot eng. wisam zaqoot...

11
Computer crime Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet ITSS 4201 Internet Insurance and Information Insurance and Information Hiding Hiding

Upload: leslie-ford

Post on 29-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Computer crimeComputer crime

University of PalestineUniversity of Palestine Eng. Wisam ZaqootEng. Wisam Zaqoot March 2011March 2011

ITSS 4201 Internet Insurance and ITSS 4201 Internet Insurance and Information HidingInformation Hiding

Page 2: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Computer crimeComputer crime

Different Different conceptsconcepts appeared, for example: appeared, for example: Hacking Hacking Fraud Fraud خداعخداع Embezzlement Embezzlement اختالساختالس SabotageSabotage التخريبالتخريب Identity Theft Identity Theft ForgeryForgery التزييفالتزييف Denial of Service Denial of Service VirusesViruses Piracy of copyrighted materialsPiracy of copyrighted materials

Page 3: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

What is a computer crime?What is a computer crime?

Some people believe that there is nothing Some people believe that there is nothing special about crimes that involve special about crimes that involve computers, and there is no need to have the computers, and there is no need to have the concept “Computer crime”. What do you concept “Computer crime”. What do you think?think?

There have been times that it was thought There have been times that it was thought any crime involving a computer was a any crime involving a computer was a computer crime computer crime

Is a murder involving the use of a scalpel Is a murder involving the use of a scalpel automatically an issue in medical ethics just automatically an issue in medical ethics just because a medical instrument was used?because a medical instrument was used?

Page 4: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

What is a computer crimeWhat is a computer crime?? Computer crime is : “ a criminal act that Computer crime is : “ a criminal act that

can be carried out only through the use of can be carried out only through the use of computer technology”computer technology”

With this, the theft of a computer With this, the theft of a computer hardware device (printer), theft of an hardware device (printer), theft of an automobile full of microprocessors would automobile full of microprocessors would not be a computer crime b/c the computer not be a computer crime b/c the computer is not the principal tool for carrying out the is not the principal tool for carrying out the crimecrime

Similarly, breaking into the computer lab, Similarly, breaking into the computer lab, vandalizing a computer system in the lab, vandalizing a computer system in the lab, these three examples are not computer these three examples are not computer crimes using this definitioncrimes using this definition

Page 5: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Quick History of Computer CrimesQuick History of Computer Crimes

Phase One: The early yearsPhase One: The early years 1960s and 1970s.1960s and 1970s. Originally, Originally, hackerhacker referred to a creative referred to a creative

programmer wrote clever code.programmer wrote clever code. The first operating systems and computer The first operating systems and computer

games were written by hackers.games were written by hackers. The term hacking was a positive term.The term hacking was a positive term. Hackers were usually high-school and Hackers were usually high-school and

college students.college students.

Page 6: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Quick History of Computer CrimesQuick History of Computer Crimes

Phase Two: Hacking takes on a more Phase Two: Hacking takes on a more negative meaning.negative meaning.

1970s through 1990s.1970s through 1990s. Authors and the media used the term hacker Authors and the media used the term hacker

to describe someone who used computers, to describe someone who used computers, without authorization, sometimes to commit without authorization, sometimes to commit crimes.crimes.

Early computer crimes were launched Early computer crimes were launched against business and government against business and government computers.computers.

Page 7: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Quick History of Computer CrimesQuick History of Computer Crimes

Phase Three: The Web EraPhase Three: The Web Era Beginning in the mid-1990s.Beginning in the mid-1990s. The increased use of the Internet for school, work, The increased use of the Internet for school, work,

business transactions, and recreation makes it business transactions, and recreation makes it attractive to criminals with basic computer skills.attractive to criminals with basic computer skills.

Crimes include the release of malicious code (viruses Crimes include the release of malicious code (viruses and worms).and worms).

Unprotected computers can be used, unsuspectingly, Unprotected computers can be used, unsuspectingly, to accomplish network disruption or commit fraud.to accomplish network disruption or commit fraud.

Hackers with minimal computer skills can Hackers with minimal computer skills can create a lot of damage by using malicious create a lot of damage by using malicious code written by others. code written by others.

Page 8: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

HactivismHactivism::

Hactivism is the use of hacking Hactivism is the use of hacking expertise to promote a political cause.expertise to promote a political cause.

This kind of hacking can range from mild to This kind of hacking can range from mild to destructive activities.destructive activities.

Some consider hactivism as modern-age civil Some consider hactivism as modern-age civil disobedience.disobedience.

Others believe hactivism denies others their Others believe hactivism denies others their freedom of speech and violates property freedom of speech and violates property rights.rights.

Do you think that hactivism is ethical?Do you think that hactivism is ethical?

Page 9: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

TodayToday : :

Far fewer individuals and Far fewer individuals and organizations are sympathetic to the organizations are sympathetic to the causes of computer hackerscauses of computer hackers Why? Possibly the growing dependence Why? Possibly the growing dependence

of citizens on the Internetof citizens on the Internet A growing concern that cyberspace A growing concern that cyberspace

must become more secure and that must become more secure and that hacking should not be tolerated hacking should not be tolerated

Page 10: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Questions About PenaltiesQuestions About Penalties

IntentIntent Should hackers who did not intend to do Should hackers who did not intend to do

damage or harm be punished differently than damage or harm be punished differently than those with criminal intentions?those with criminal intentions?

AgeAge Should underage hackers receive a different Should underage hackers receive a different

penalty than adult hackers?penalty than adult hackers?

Damage DoneDamage Done Should the penalty correspond to the actual Should the penalty correspond to the actual

damage done or the potential for damage?damage done or the potential for damage?

Page 11: Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and

Security can be improved bySecurity can be improved by::

Ongoing education and training to Ongoing education and training to recognize the risks.recognize the risks.

Better system design.Better system design.Use of security tools and systems.Use of security tools and systems.Challenging “others” to find flaws Challenging “others” to find flaws in systems.in systems.

Writing and enforcing laws that Writing and enforcing laws that don’t impede research and don’t impede research and advancement.advancement.