Content-Module 3: Social, Organizational and Personal Issues Objective #2: Computer Crimes Computer Crime
Content-Module 3: Social, Organizational and Personal Issues Objective #2: Computer Crimes Computer Crime
Content-Module 3: Social, Organizational and Personal Issues Objective #2: Computer Crimes Computer Crime
Computer crime.
1. Propaganda
2. Computer fraud
3. Industrial Sabotage
This is when an individual(s) cause damage or willfully interfere with a hardware and
software. The “Dark Web” which has become a popular term in technology era, is one in
which unauthorized persons complete industrial sabotage. In this context, unauthorized
entities illegally and unethically obtaining confidential information from individuals or
companies for malicious intents.
4. Computer Viruses
5. Malware
6. Electronic Eavesdropping
7. Cyber terrorism
Cyber terrorism refers to the use of Internet based attacks in terrorist activities, including
acts of deliberate, large-scale disruption of computer networks, especially of personal
computers attached to the Internet, by the means of tools such as computer viruses.
8. Hacking
This is the process of attempting to gain or successfully gaining, unauthorized access to
computer resources. Hacking can take any of the following forms: Website Hacking,
Network Hacking, Ethical Hacking, Email Hacking, Password Hacking, Online Banking
Hacking or Computer Hacking.
9. Identity theft
This is a crime used to refer to fraud that involves someone pretending to be someone
else in order to steal money, gain access to resources on a computer system or internet; or
get other benefits. The person whose identity is used can suffer various consequences
when he or she is held responsible for the perpetrator's actions.
10. Spoofing
An attacker alters his identity so that someone will believe that he/she is someone else.
E-mail spoofing is a term used to describe fraudulent e-mail activity in which the
sender’s address and other parts of the e-mail header are altered to appear as though the
e-mail originated from a different source. E-mail spoofing is a technique commonly used
for spam e-mail and phishing to hide the origin of an e-mail message. For example you
received an email with an Amazon header stating that you won a free gift certificate or
free money, and requires you to click on a link provided to redeem it.
11. Phishing
13. Piracy
Software piracy is the illegally using, copying and reselling of software without the
authorization or permission of the software creator. The unauthorized copying may be
done for personal use or business use.
This is when criminals (unauthorized persons), popularly known as hackers, use the
Internet or other computer networks to break into a particular computer system in order to
access forbidden information or to cause some damage. Many companies and
organizations that have networked computers use various security measures, such as
firewalls, encryption and authentication methods to protect their computer systems.
15. Spam
Spam is the abuse of electronic messaging systems (including most broadcast mediums,
digital delivery systems) to send unsolicited bulk messages extensively. Spams,
especially those associated with emails, often contain viruses which may cause hacking
to take place, damaging computer systems or corrupting files.
Objective #3: Explain how Information Technology System components can be
threats, vulnerabilities, countermeasures, attacks and compromises to
organizations.
Threat: A threat refers to a new or newly discovered incident that has the potential to bring harm
to a computer system or a company overall.
Business organizations should ensure that their employees are staying informed of
current trends in cybersecurity, so they can quickly identify new threats. They should
subscribe to blogs and podcasts that cover these issues. Employees can also attend
workshops and join professional associations so they can benefit from breaking news
Organizational heads may designate a central group of employees who are responsible for
risk management and determine the appropriate funding level for this activity. When it
comes to designing and implementing a risk assessment framework, it is critical to
prioritize the most important breaches that need to be addressed. Although frequency
may differ in each organization, this level of assessment must be done on a regular,
recurring basis.
Viruses are categorized as threats because they could cause harm to an organization,
through exposure to an automated attack, as opposed to one executed by humans. These
threats may be uncontrollable and often difficult or impossible to identify in advance.
Still, certain measures help persons to assess threats regularly, so that they can be better
prepared when a situation does happen.
Organizations can perform regular threat assessments to determine the best approaches to
protecting a system against a specific threat, along with assessing different types of
threats. They can also carry out prototype testing, by modeling real-world threats in order
to discover vulnerabilities.
Encryption as a two-edged sword
Encryption itself is supposedly a good thing, as the sole purpose for it was to protect
information and computer systems from hackers and unauthorized access. Essentially,
encryption safeguards a user’s identity and privacy. When using encryption, users can
somehow rest assured that phone calls, email messages, online purchases, and other
online activities are safely protected from any potential intruder.
Unfortunately, while encryption was designed for good intentions, it does have a dark
side. Apart from the political issues surrounding the dilemma, cybercriminals have also
used strong encryption methods to develop unbreakable crypto-ransomware variants,
which they use to force victims to pay a ransom fee or lose access to their files. In other
words, they gain access to persons information and resources, blocks them from
accessing or using such information or resources and then in turn, require the owner to
either make payments to regain ownership or worst case does not get back access at all.
There are many methods used by organizations used to dispose of obsolete computer
equipment. These included employee giveaways, donations to charity or disposal to disposal
sites. Obsolete computers are considered toxic waste in many states and must be disposed of
properly.
These hazardous waste facility in turn, must maintain record of the obsolete equipment to
refrain from getting in conflict with the law.
Objective #4: Describe legal and ethical considerations related to the handling and
management of enterprise information assets
Including:
Laws
Refers to a system of rules, normally enforced through authorized institutions or government
bodies. Laws serves as primary social mediator in relations between people. The main
difference between laws and ethics is that laws carry the authority of a governing body, and
ethics do not. Ethics in turn are based on cultural values, while some ethical standards are
universal.
Policies
Procedures
Policies and procedures are a set of documents that describe an organization's policies for
operation and the procedures necessary to fulfill the policies. They are often initiated because
of some external requirement, such as environmental compliance or other governmental
regulations. The easiest way to start writing policies and procedures is to interview the users
of the policies and procedures and create a flow chart, task map or work flow of the process
from start to finish. This information can then be represented in a written format. The policy
users can then review this and confirm that the written word matches the flow chart.
Guidelines
A statement or other indication of policy or procedure by which to determine a course of
action:
Misuse of information
This is a method that is used when persons tamper with information, by making changes to
the information delivered based on their interest. The information that is altered normally
misleads the party that accesses or utilizes such information. This gives an impression that is
false from the perspective of the sender and may lead to legal sanctions.
Information that is normally provided, often contain limited facts, as the bulk of the factual
information is often omitted purposefully. This brings about deceit and false representation to
the persons coming in contact with such information. The type of communication that is
created as a result of such deceitful intent is called a deceptive message. This management of
given information by a sender in order to provide a receiver with a perception of that same
information believed to be false by the sender is referred to as information manipulation.
Identity theft
Is a crime used to refer to fraud that involves someone pretending to be someone else in
order to personal information, such as credit card, banking information or other malicious
access to information. The person whose identity is used can suffer various consequences
when he or she is held responsible for the perpetrator's actions. In many countries specific
laws make it a crime to use another person's identity for personal gain.
Invasion of privacy
The wrongful intrusion into a person's private activities by other individuals or by the
government.
The wrongful intrusion by individuals or the government into private affairs with which
the public has no concern.
Pharming
https://www.slideshare.net/tejesh002/cyber-terrorism-36520078
https://www.slideshare.net/kranthi0987/phishing-ppt
https://www.slideshare.net/shariquevicky/hacking-70755233
Warren, E. (1962, November 12). Legal, Ethical, and Professional Issues in Information
https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf