26
Computer and Crime

Computer and Crime

Embed Size (px)

Citation preview

Page 1: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 1/26

Computer and Crime

Page 2: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 2/26

Isyu Sosial

Dampak Positif1. Komunikasi yanglebih baik.

2. Transportasi

data yang cepataman.3. Pekerjaan

selesai lebihcepat akurat.

4. Efisiensi tenagakerja

Dampak Negatif1. Manusiatergantung dengankomputer.

2. Kehilanganpekerjaan karenakomputer lebihcepat teliti. 

3. Hacker yangmerusak datadata dalamkomputerwalaupun sudah dip ssword

Page 3: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 3/26

Computer Crime• The unauthorized use, access, modification,and destruction of hardware, software,

data, or network resources

• The unauthorized release of information

• The unauthorized copying of software

• Denying an end user access to his or herown hardware, software, data, or networkresources

• Using or conspiring to use computer ornetwork resources illegally to obtaininformation or tangible property

Page 4: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 4/26

Cyber Crime Safeguards

Page 5: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 5/26

HackingDefinition• The obsessive use of

computers, or the unauthorizedaccess and use of networkedcomputer systems

Page 6: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 6/26

Common Hacking Tactics• Denial of Service  –  hammering awebsite’s equipment with toomany requests for information,effectively clogging the system,slowing performance or evencrashing the site

Scans – 

 widespread probes of theInternet to determine types ofcomputers, services, andconnections

Page 7: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 7/26

Common Hacking Tactics• Sniffer  –  programs that covertlysearch individual packets of dataas they pass through theInternet, capturing passwords orentire contents

• Spoofing  –  faking an e-mail

address or Web page to trickusers into passing along criticalinformation like passwords orcredit card numbers

Page 8: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 8/26

Common Hacking Tactics

• Trojan Horse  –  a program that,unknown to the user, containsinstructions that exploit a known

vulnerability in some software

• Back Doors  –  a point hidden point

of entry to be used in case theoriginal entry point has beendetected or blocked

Page 9: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 9/26

Common Hacking Tactics• Malicious Applets  –  tiny programsthat misuse your computer’sresources, modify files on the harddisk, send fake e-mail, or stealpasswords

• War Dialing  –  programs that

automatically dial thousands oftelephone numbers in search of away in through a modemconnection

Page 10: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 10/26

Common Hacking Tactics• Logic Bombs  –  an instruction in a

computer program that triggers amalicious act

• Buffer Overflow  –  a technique forcrashing or gaining control of acomputer by sending too much data tothe buffer in a computer’s memory

• Password Crackers  –  software thatcan guess passwords

Page 11: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 11/26

Common Hacking Tactics• Social Engineering  –  a tactic usedto gain access to computersystems by talking unsuspectingcompany employees out ofvaluable information such aspasswords

Dumpster Diving  – 

 sifting througha company’s garbage to findinformation to help break intotheir computers

Page 12: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 12/26

Cyber TheftDefinition• Computer crime involving the

theft of money

Page 13: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 13/26

Unauthorized Use

Definition• Time and resource theft may

range from doing privateconsulting or personal finances,or playing video games, tounauthorized use of theInternet on company networks

Page 14: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 14/26

Piracy• Software Piracy  –  unauthorizedcopying of computer programs

• Piracy of Intellectual Property  –  unauthorized copying ofcopyrighted material, such asmusic, videos, images, articles,books and other written worksespecially vulnerable to copyrightinfringement

Page 15: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 15/26

Virus vs. Worm• Computer Virus  –  a programcode that cannot work withoutbeing inserted into anotherprogram

Worm  – 

 distinct program thatcan run unaided

Page 16: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 16/26

Privacy Issues• Accessing individuals’ private e-mailconversations and computer records,and collecting and sharing informationabout individuals gained from their

visits to Internet websites andnewsgroups

• Always knowing where a person is,

especially as mobile and pagingservices become more closelyassociated with people rather thanplaces

Page 17: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 17/26

Privacy Issues• Using customer information gainedfrom many sources to marketadditional business services

• Collecting telephone numbers, e-mail addresses, credit card

numbers, and other personalinformation to build individualcustomer profiles

Page 18: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 18/26

Privacy on the Internet• E-mail can be encrypted• Newsgroup postings can be sent

through anonymous remailers

• ISP can be asked not to sell yourname and personal information tomailing list providers and othermarketers

• Decline to reveal personal data andinterests on online service and websiteuser profiles

Page 19: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 19/26

Computer Matching

Definition• Using physical profiles or

personal data and profilingsoftware to match individualswith data

Page 20: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 20/26

Privacy Laws

Definition• Rules that regulate the

collection and use of personaldata by businesses

Page 21: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 21/26

Censorship• Spamming  –  indiscriminate sendingof unsolicited e-mail messages tomany Internet users

• Flaming  –  sending extremelycritical, derogatory, and often

vulgar e-mail messages ornewsgroup postings to other userson the Internet or online services

Page 22: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 22/26

Other Challenges• Employment  –  significantreductions in job opportunitiesas well as different types of

skills required for new jobs• Computer Monitoring  –  

computers used to monitor theproductivity and behavior ofemployees as they work

Page 23: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 23/26

Other Challenges• Working Conditions  –  jobs requiringa skilled craftsman have beenreplaced by jobs requiring routine,

repetitive tasks or standby roles

• Individuality  –  dehumanize and

depersonalize activities becausecomputers eliminate humanrelationships

Page 24: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 24/26

 

Page 25: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 25/26

Next Week• Computer and IndustrySebutkan perbedaan worm, trojandan virus

Bagaimana komputer dan ITmempengaruhi dunia IndustriSebutkan contoh implementasiyang kompleks dengan

menyebutkan detil aplikasi,rancangan, teknologiBuat presentasinya

Page 26: Computer and Crime

7/27/2019 Computer and Crime

http://slidepdf.com/reader/full/computer-and-crime 26/26

Reference• Information SystemManagement, McGrawhill