Module 4 Computer Crimes
Module 4 Computer Crimes
Module 4 Computer Crimes
crimes
Industrial spy Capture trade secrets or gain Well funded, well trained Minimal Low
competitive advantage
Cyberterrorist Cause destruction to key Not necessarily well Very high Low
infrastructure components funded nor well trained
• Passing of laws;
• Having in mind the dangers of the computer
crime the state should pass proper sanctions
against perpetrators of such crime that will
impose serious threat to many potential hackers
who will not run the risk of entering into
protected systems
Prevention of the computer crime
• Install a corporate firewall.
• Install anti-virus software on personal computers.
• Implement safeguards against attacks by malicious insiders.
• Address the ten most critical Internet security threats (10 each
in Windows and UNIX): Top Twenty List
• Verify backup processes for critical software and databases.
• Conduct periodic IT security audits.
• See: Tourbus Virus Solution or locally
• MS Patch for IE—CNET News. Implications of changes, speed
of reaction
Detection of computer crime…
• injured party reports damage
• One of the most frequent ways to discover any
crime is receiving a report about it by the injured
party.
• This is true for computer crimes too. In this
sense an injured party can be both physical and
legal subjects, state organs and institutions.
Detection of computer crime…
• administrators of information systems find out
• Investigators of this type of crime sometimes use the
original application program and sometimes use special
software for analysis and tools for investigation e.g.
GFI Lan guard & GFI web monitor.
• Investigators have found ways to collect traces from a
remote computer which is out of their physical reach
through telephone line or network connection.
• Moreover it is possible to follow the work of the
computer network using the Internet.
Detection of computer crime…
computer Forensic :
Computer investigation is the science of locating; extracting,
analyzing and protecting specific data from computers and
digital storage media, which can be interpreted to serve as
legal evidence in courts of law.