computer and crime
TRANSCRIPT
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 1/26
Computer and Crime
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 2/26
Isyu Sosial
Dampak Positif1. Komunikasi yanglebih baik.
2. Transportasi
data yang cepataman.3. Pekerjaan
selesai lebihcepat akurat.
4. Efisiensi tenagakerja
Dampak Negatif1. Manusiatergantung dengankomputer.
2. Kehilanganpekerjaan karenakomputer lebihcepat teliti.
3. Hacker yangmerusak datadata dalamkomputerwalaupun sudah dip ssword
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 3/26
Computer Crime• The unauthorized use, access, modification,and destruction of hardware, software,
data, or network resources
• The unauthorized release of information
• The unauthorized copying of software
• Denying an end user access to his or herown hardware, software, data, or networkresources
• Using or conspiring to use computer ornetwork resources illegally to obtaininformation or tangible property
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 4/26
Cyber Crime Safeguards
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 5/26
HackingDefinition• The obsessive use of
computers, or the unauthorizedaccess and use of networkedcomputer systems
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 6/26
Common Hacking Tactics• Denial of Service – hammering awebsite’s equipment with toomany requests for information,effectively clogging the system,slowing performance or evencrashing the site
•
Scans –
widespread probes of theInternet to determine types ofcomputers, services, andconnections
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 7/26
Common Hacking Tactics• Sniffer – programs that covertlysearch individual packets of dataas they pass through theInternet, capturing passwords orentire contents
• Spoofing – faking an e-mail
address or Web page to trickusers into passing along criticalinformation like passwords orcredit card numbers
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 8/26
Common Hacking Tactics
• Trojan Horse – a program that,unknown to the user, containsinstructions that exploit a known
vulnerability in some software
• Back Doors – a point hidden point
of entry to be used in case theoriginal entry point has beendetected or blocked
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 9/26
Common Hacking Tactics• Malicious Applets – tiny programsthat misuse your computer’sresources, modify files on the harddisk, send fake e-mail, or stealpasswords
• War Dialing – programs that
automatically dial thousands oftelephone numbers in search of away in through a modemconnection
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 10/26
Common Hacking Tactics• Logic Bombs – an instruction in a
computer program that triggers amalicious act
• Buffer Overflow – a technique forcrashing or gaining control of acomputer by sending too much data tothe buffer in a computer’s memory
• Password Crackers – software thatcan guess passwords
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 11/26
Common Hacking Tactics• Social Engineering – a tactic usedto gain access to computersystems by talking unsuspectingcompany employees out ofvaluable information such aspasswords
•
Dumpster Diving –
sifting througha company’s garbage to findinformation to help break intotheir computers
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 12/26
Cyber TheftDefinition• Computer crime involving the
theft of money
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 13/26
Unauthorized Use
Definition• Time and resource theft may
range from doing privateconsulting or personal finances,or playing video games, tounauthorized use of theInternet on company networks
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 14/26
Piracy• Software Piracy – unauthorizedcopying of computer programs
• Piracy of Intellectual Property – unauthorized copying ofcopyrighted material, such asmusic, videos, images, articles,books and other written worksespecially vulnerable to copyrightinfringement
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 15/26
Virus vs. Worm• Computer Virus – a programcode that cannot work withoutbeing inserted into anotherprogram
•
Worm –
distinct program thatcan run unaided
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 16/26
Privacy Issues• Accessing individuals’ private e-mailconversations and computer records,and collecting and sharing informationabout individuals gained from their
visits to Internet websites andnewsgroups
• Always knowing where a person is,
especially as mobile and pagingservices become more closelyassociated with people rather thanplaces
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 17/26
Privacy Issues• Using customer information gainedfrom many sources to marketadditional business services
• Collecting telephone numbers, e-mail addresses, credit card
numbers, and other personalinformation to build individualcustomer profiles
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 18/26
Privacy on the Internet• E-mail can be encrypted• Newsgroup postings can be sent
through anonymous remailers
• ISP can be asked not to sell yourname and personal information tomailing list providers and othermarketers
• Decline to reveal personal data andinterests on online service and websiteuser profiles
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 19/26
Computer Matching
Definition• Using physical profiles or
personal data and profilingsoftware to match individualswith data
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 20/26
Privacy Laws
Definition• Rules that regulate the
collection and use of personaldata by businesses
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 21/26
Censorship• Spamming – indiscriminate sendingof unsolicited e-mail messages tomany Internet users
• Flaming – sending extremelycritical, derogatory, and often
vulgar e-mail messages ornewsgroup postings to other userson the Internet or online services
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 22/26
Other Challenges• Employment – significantreductions in job opportunitiesas well as different types of
skills required for new jobs• Computer Monitoring –
computers used to monitor theproductivity and behavior ofemployees as they work
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 23/26
Other Challenges• Working Conditions – jobs requiringa skilled craftsman have beenreplaced by jobs requiring routine,
repetitive tasks or standby roles
• Individuality – dehumanize and
depersonalize activities becausecomputers eliminate humanrelationships
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 24/26
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 25/26
Next Week• Computer and IndustrySebutkan perbedaan worm, trojandan virus
Bagaimana komputer dan ITmempengaruhi dunia IndustriSebutkan contoh implementasiyang kompleks dengan
menyebutkan detil aplikasi,rancangan, teknologiBuat presentasinya
7/27/2019 Computer and Crime
http://slidepdf.com/reader/full/computer-and-crime 26/26
Reference• Information SystemManagement, McGrawhill