Sei sulla pagina 1di 16

Computer Crimes and Ethics

By: Nitesh Verma Btech Hons MBA IT Section 150 Roll No. 14
www.powerpointpresentationon.blogspot.com
CSE 001c 1

Topics of Discussion
Introduction What are Computer Crimes and Ethics Types of Computer Crime Information Systems and Technology Vulnerabilities Ways to Manage the Risks Associated with Vulnerabilities Can we trust Computers?

CSE 001c 2

Introduction

With the popularization of the Internet, interest in computer crime, ethics, and privacy has gained momentum. News items describe about identity theft, credit cards numbers posted on chat rooms, and child pornography web sites. Computer information systems are vulnerable to physical attacks, electronic hacking, and natural disasters.
CSE 001c 3

What are Computer Crimes


CRIMES
Computer crime, cyber crime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.

CSE 001c

ETHICS
Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.

CSE 001c

Types of computer crimes

Theft Fraud Copyright Infringement Attacks on organizations and individuals.


CSE 001c 6

Theft

Fraud

Computer Crimes

Attacks on organizations

Copyright Infringement

CSE 001c

Information Systems and Technology Vulnerabilities

Viruses Worms Trojan Horse Time Bomb Logic Bomb Trapdoor

CSE 001c

Viruses

Worms

Trapdoor

IS and TV
Trojan Horse Time Bomb Logic Bomb

CSE 001c

Ways to Manage the Risks Associated with Vulnerabilities


Managing the risk Managing the risk Managing the risk infringement. Managing the risk vulnerabilities.

of computer crime. of fraud. of copyright

of technology

CSE 001c

10

Managing:

Risk of computer crime

Risk of fraud

Risk of copyright infringement

Risk of technology vulnerabilities

CSE 001c

11

Firewalls

To establish a barrier between the business computer systems and the outside world. The usual implementation of a firewall is to place a barrier between a computer system and the Internet. It is a combination of hardware and software or it may be software only. Firewall filters or restricts internal or external access to the systems.
CSE 001c 12

Anti-Virus Software and Updates


Antivirus software is a software basically used to remove malicious files and viruses. Virus protection software must be kept update as new viruses are developed on what seems like a daily basis. Some businesses have policies that limit acceptance of attachments to e-mails, prohibit the use of disks prepared on non-business systems, and restrict downloading files from the Internet from trusted sites only.
CSE 001c 13

Can we trust computers


Nationwide telephone service in US was disrupted for nine hours in 1990 because of a software error. U.S. Kane Carpet Company went out of business due to a bad computerized inventory control system. Denver Airport computer-controlled luggage system was closed for 2 years about $700 million lost. The Therac-25 software-controlled radiation machine killed three and injured several in 1985-87. Why? Lack of testing, honesty, ethics

CSE 001c

14

CONCLUSION

Risks can be managed in information systems environments. Security is an illusion as any system can be attacked under the right circumstances. The greatest hazard is to be complacent. (i.e. to be self satisfied).

CSE 001c

15

Thank You

CSE 001c

16

Potrebbero piacerti anche