Week-7 (20231016161125)
Week-7 (20231016161125)
Week-7 (20231016161125)
Crimes
LIVING IN THE IT ERA - WEEK 7
Property
Many networks have audit controls to track which files were opened, which
programs and servers were used, and so on. This creates an audit trail, a
record of how a transaction was handled from input through processing and
output.
The following are the computer crime laws:
• Fair Credit Reporting Act of 1970 (FCRA). Controls operations of credit-reporting
bureaus, including how they collect, store, and use credit information.
• Freedom of Information Act of 1970. Ensures access of individuals to personal
data collected about them and about government activities in federal agency files.
• Tax Reform Act of 1976. Regulates the collection and use of certain information by
the Internal Revenue Service.
• Rights to Financial Privacy Act of 1978. Regulates government access to certain
records held by financial institutions.
• Electronic Funds Transfer Act of 1979. Enumerates the responsibilities of
companies that use electronic funds transfer systems, including consumer rights and
liability for bank debit cards.
• Computer Matching and Privacy Act of 1988. Regulates cross-reference between
federal agencies‘ computer files.
Video Privacy Act of 1988. Prevents retail stores from disclosing video rental
records without a court order.
Telephone Consumer Protection Act of 1991. Limits telemarketers‘ practices.
Cable Act of 1992. Regulates companies and organizations that provide wireless
communication services, including cellular phones.
Computer Abuse Amendments Act of 1994. Prohibits transmissions of harmful
computer programs and code, including viruses.
Children’s Online Privacy Protection Act of 1998. Establishes standards for sites
that collect information from children. Its purpose is to prohibit unfair or deceptive acts or
practices in connection with the collection, use, or disclosure of personally identifiable
information from and about children on the Internet.
Education Privacy Act. Restricts collection and use of data by federally funded
educational institutions, including specifications for the type of data collected, access by
parents and students to the data, and limitations on disclosure.
The following are the federal computer crime laws:
Copyrights Law. Sets standards on copyrights and computer programs.
Fraud and False Statements Law. Standards against fraud and related activity in
connection with access devices and computers.
Espionage and Censorship. Sets standards in gathering, transmitting, or losing
defense information.
Mail Fraud Law
• General prohibition on pen register and trap and trace device use
• Pen Registers and Trap and Trace Devices
• Standards against fraud by wire, radio, or television
• Standards against Interception and disclosure of wire, oral, or electronic
communications prohibited
• Wire and Electronic Communications Interception and Interception of Oral
Communications
Tips in preventing crimes on the Internet
Internet security can include firewalls and a number of methods to secure
financial transactions. A firewall includes hardware and software combinations
that act as a barrier between an organization‘s information system and the
outside world. A number of systems have been developed to safeguard financial
transactions on the Internet.
The following tips can be taken to help prevent crime on the Internet:
• Use of stand-alone firewall, including hardware and software with network
monitoring capabilities.
• Use Internet security specialists to perform audits of all Internet and network
activities.
• Develop effective Internet and security policies for all employees.
• Monitor managers and employees to make sure they are using the Internet for
business purposes only.
Data alteration/theft
Data and information are valuable corporate assets. The intentional
use of illegal and destructive programs to alter or destroy data is as much
a crime as destroying tangible goods.
Most common of these types of programs are viruses and worms,
which are software programs that, when loaded into a computer system,
will destroy, interrupt, or cause errors in processing. There are more than
53,000 known computer viruses today, with more than 6,000 new viruses
and worms being discovered each year.
Some viruses and worms attack personal computers, while others
attack network and client/server systems.
A personal computer can get a virus from an infected disk, an
application, or e-mail attachments received from the Internet.
A virus or worm that attacks a network or client/server system is
usually more severe because it can affect hundreds or thousands of
personal computers and other devices attached to the network.
Workplace computer virus infections are increasing rapidly
because of several viruses spread through e-mail attachments.
Malicious access
• Crimes involving illegal system access and use of computer services are a
concern to both government and business. Federal, state, and local government
computers are sometimes left unattended over weekends without proper security,
and university computers are often used for commercial purposes under the
pretense of research or other legitimate academic pursuits.
• A 28-year-old computer expert allegedly tied up thousands of US West
computers in an attempt to solve a classic math problem. The individual
reportedly obtained the passwords to hundreds of computers and diverted them
to search for a new prime number, racking up ten years of computer processing
time. The alleged hacking was discovered by a US West Intrusion Response
Team after company officials noticed that computers were taking up to five
minutes to retrieve telephone numbers, when normally they require only three to
five seconds. At one point, customer calls had to be rerouted to other states, and
the delays threatened to close down the Phoenix Service Delivery Center.
Since the outset of information technology, computers have been
plagued by criminal hackers.
A hacker is a person who enjoys computer technology and spends
time learning and using computer systems. A criminal hacker, also
called a cracker, is a computer-savvy person who attempts to gain
unauthorized or illegal access to computer systems. In many cases,
criminal hackers are people who are looking for fun and excitement –
the challenge of beating the system.
Classification of computer viruses
The two most common types of viruses are application viruses and
system viruses.