Video Content Lesson 11 Flashcards
(48 cards)
Question
Answer
Types of Computer Crime
Overview Military Attacks Business Attacks Financial Attacks Terrorist Attacks Grudge Attacks Fun Attacks Hacking/Cracking
Overview
Crime is Crime
Computers provide unique tools for criminals to use when committing crimes
The apparent anonymity gives criminals a false sense of security
The reasons for computer crime are the same for any type of crime (thrill, greed, prestige, revenge)
Military Attacks
attempt to acquire secret information from military or law enforcement agencies
disclosure could cause great harm
Business Attacks
attempt to acquire secret information from a commercial organization
purpose is generally to harm or embarrass a person or an organization (Business secrets, personal medical information, financial information, secret or sensitive corporate information)
Financial Attacks
Attempt to improperly acquire goods, services, or money (greed based attack)
Phone phreaking (break into phone company for free long distance)
Credit Card Fraud
Terrorist Attacks
attempt to alter the normal lifestyle of a group of people
Most likely target is infrastructure or high visibility entity
It is expected that such an attack could coincide with a physical attack making the emergency response more difficult
Grudge Attacks
The “I’m gonna get you back!” attack
Revenge directed toward a person or organization (disgruntled employee)
Purpose is generally to harm the reputation of the intended victim
Fun Attacks
Attacks “just to see if I can do it”
Main purpose is for the thrill and prestige
Hacking/Cracking
the art of compromising access controls to gain unauthorized access to a system
Once access is gained the attacker generally launches a data attack
True hackers are not bad
crackers are individuals who seek to compromise access controls for illegal means
Categories of Law
Criminal Law Civil Law Admin/Regulatory Law Categories of Law Intellectual Property Law Trade Secrets Copyrights Trademarks Patents There are three main categories of law in the US (Criminal, Civil, Administrative/Regulatory) Each imposes different potential penalties
Criminal Law
Criminal Law
Body of laws that preserve the peace and keep society safe
Criminal cases are prosecuted by the state
Penalties (Community Service, Monetary Penalties (fine), Incarceration)
Civil Law
Laws intended to settle disputes between individuals and organizations
Most laws are civil laws
In general, law enforcement personnel are not parties to civil litigation, unless to restore order
Civil courts often use different standards of proof than criminal courts
Criminal - proof beyond a reasonable doubt
Civil - preponderance of evidence
Penalties are generally monetary
Punitive (Punish offender)
Compensatory (payback to the offended)
Admin/Regulatory Law
any regulations that govern specific personal or organizational practices
Most commonly associated with specific industries or business functions
Hazardous waste handling
nuclear materials handling
medical records
hiring practices
Categories of Law
Religious Law (laws that originate in religion, not legislation; some societies separate religious and secular laws; others combine/integrate them) Mixed Law (Blending two or more systems of law; More and more common as international commerce and interaction increases; EX - NAFTA (North America Free Trade Agreement))
Intellectual Property Law
Several types of laws help protect the intellectual property of individuals and organizations
the basic purpose is to protect the effort and creativity invested to develop a product or service
as society moves toward increasingly service-oriented businesses, intellectual property protection becomes crucial
Most large companies have very strong public associations with their brand names and products (protection of brand and product association is important to the organization’s ability to conduct business)
Trade Secrets
Intellectual property that is critical to a business
Secret recipe or unique process
Protection only requires sufficient controls in place
Copyrights
Guarantees the creator of “original works of authorship” protection from unauthorized duplication and distribution
(Books, Music, Pictures (still and motion), other art and architectural works)
Trademarks
Word, slogans, or logos that identify an organization or product
Trademark registration is not required, but doing so guarantees exclusive use of the trademark ?Trademarks are valid for 10 years, renewable
Patents
Protects an inventor’s right to exclusive control of the creation and distribution of an invention
Patents last for 20 years, nonrenewable
To warrant a patent, the product must be new, useful, and nonobvious
Computer Laws
Technology Threat Government Intervention Fraud and Abuse Act Computer Security Act Amended Security Act Security Reform Act Privacy Acts USA Patriot Act Liability
Technology Threat
The explosion in growth makes it very easy to share data
Without appropriate controls, sensitive data could be disclosed and made available to many people and organizations
Main areas of concern (personal medical records; personal and organizational records; other potentially harmful personal records)
Government Intervention
Laws have been updated and changed as new needs arose
Fraud and Abuse Act
Computer Fraud and Abuse Act of 1986 (1994, 1996, 2001)
Law that covers computer crime that crosses state boundaries
Main (original) provisions that constitute a crime (Unauthorized access to classified or financial information on a federal system; Unauthorized access to a federal system; Any use of a federal system o perpetrate fraud; Causing malicious damage to a federal system that exceeds $1000; Modifying medical records or traffic passwords stored on a federal system)
Amendments added these definitions of crime (Any development or introduction of malicious code that causes system damage; Modifies definition to include any computer used in interstate commerce, not just federal systems)
Allowed imprisonment of offender, regardless of the intent
Provides legal authority for victims to pursue civil action