Chapter 3 Computer and Internet Crime 1
Chapter 3 Computer and Internet Crime 1
Learning Objectives
Computer crime
- Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech crime.
- The commission of illegal acts through the use of a computer or against a computer
system.
- Illegal activities carried out on or by means of a computer.
- Computer crime includes criminal trespass into another computer system, theft of
computerized data, and the use of an on-line system to commit or aid in the commission
of fraud.
- Computers or computer systems can be the object of the crime such as:
• Destroying a company’s computer center or a company’s computer files),
• Stealing computer lists by illegally gaining access to a computer system using a
home computer.
• Simply accessing a computer system without authorization or with intent to do
harm, even by accident, is now a federal crime.
- Computer crime is an act performed by a knowledgeable computer user, sometimes
referred to as a hacker that illegally browses or steals a company's or individual's private
information. In some cases, this person or group of individuals may be malicious and
destroy or otherwise corrupt the computer or data files.
- In most cases, someone commits a computer crime to obtain goods or money. Greed and
desperation are powerful motivators for some people to try stealing by way of computer
crimes. Some people may also commit a computer crime because they are pressured, or
forced, to do so by another person.
- Some people also commit a computer crime to prove they can do it. A person who can
successfully execute a computer crime may find great personal satisfaction in doing so.
These types of people, sometimes called black hat hackers, like to create chaos, wreak
havoc on other people and companies.
- Another reason computer crimes are sometimes committed is because people are bored.
They want something to do and don't care if they commit a crime.
Computer abuse
- The commission of acts involving a computer that may not be illegal but that are
considered unethical.
- The popularity of the Internet and e-mail has turned one form of computer abuse-
spamming into a serious problem for both individuals and businesses.
• Ransomware - Infecting a computer or network with ransomware that holds data hostage
until a ransom is paid.
• Salami slicing - Stealing tiny amounts of money from each transaction.
• Scam - Tricking people into believing something that is not true.
• Sextortion - Extortion where a victim's private data of a sexual nature is acquired illegally
by another person.
• Slander - Posting libel or slander against another person or company.
• Software piracy - Copying, distributing, or using software that was not purchased by the
user of the software.
• Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
• Spoofing - Deceiving a system into thinking you are someone you're not.
• Swatting - The act of calling in a false police report to someone else's home.
• Theft - Stealing or taking anything (e.g., hardware, software, or information) that doesn't
belong to you.
• Typosquatting - Setting up a domain that is a misspelling of another domain.
• Unauthorized access - Gaining access to systems you have no permission to access.
• Vandalism - Damaging any hardware, software, website, or other object.
• Wiretapping - Connecting a device to a phone line to listen to conversations.
Types of hackers
• Professional hackers
– Black Hats – the Bad Guys
• Script kiddies
– Mostly kids/students
• User tools created by black hats,
– To get free stuff
Ethical hacking, also known as the white hat hacking type, tests a computer system or
network to assess its security and attack vulnerability. But why do we need ethical hacking?
Ethical hacking is essential to uncover your systems' weaknesses, so you can fix them before
malicious hackers do.
You might think this sounds common sense, but many companies overlook this crucial
step in their security protocols until they've been hacked. It's much easier (and cheaper) to fix
bugs in your system before they're exploited than after.
Ethical hacking often involves penetration testing or vulnerability scanning, and it helps
organizations to discover security vulnerabilities that hackers can exploit. These tests are usually
performed by skilled computer professionals who are not maliciously trying to break into a system
but want to help improve its defenses against real-world threats.
What is the Importance and the Key Concepts of Ethical Hacking?
Ethical hacking is crucial because it helps protect the network from cyber-attacks. Ethical
hacking is a special kind of penetration testing conducted for security purposes.
There is three central importance of Ethical Hacking:
• It helps find all the vulnerabilities in your network, so you can fix them immediately before
they get exploited by criminals or hackers.
• It helps identify the weak points in your network and improves its security by implementing
strong security measures.
• It also helps train employees about cybersecurity issues, so they don't fall for phishing
scams or other attacks.
However, to become an ethical hacker, you must first understand the three key concepts
of Ethical Hacking. The three main concepts of Ethical Hacking are:
➢ Scanning
Scanning identifies the target network, its devices, and their current configurations.
This information can be used to identify vulnerabilities and determine what type of
ethical hacking attack will work best on those devices.
➢ Enumeration
Microsoft defines their Trustworthy Computing Initiative as a label for a whole range of
advances that have to be made for people to be as comfortable using devices powered by
computers and software as they are today using a device that is powered by electricity.
Microsoft has specified four core areas in which makes up the Trustworthy Computing
Initiative known as the Four Pillars of Trustworthy Computing.
✓ Security
✓ Privacy
✓ Reliability
✓ Business Integrity
Information security applies to all aspects or safeguarding data in whatever form and is not
confined to just computer systems or information in electronic form.
Three widely accepted elements of Information Security are confidentiality, integrity, and
availability also known as the mnemonic “CIA”.
❖ Integrity is derived from not only the organization but the individual team members.
Components such as trust, ability and character are the defining building blocks that create
an organizations integrity.
❖ Availability according to the U.S. Nuclear Regulatory Commission is the degree to which
information or processes are reasonably accessible and usable, upon demand, by an
authorized entity, allowing authorized access to resources and timely performance of time-
critical operations.
2. Privacy
– the quality or state of being apart from company or observation b) freedom from
unauthorized intrusion.
– Countries around the world have implemented privacy and data protection
legislation.
• In 2012 the Philippines passed the Republic Act. No. 10173 also known
as the Data Privacy Act 2012, comprehensive and strict privacy legislation
“to protect the fundamental human right of privacy, of communication while
ensuring free flow of information to promote innovation and growth.”
3. Reliability
– the extent to which an experiment, test, or measuring procedure yields the same
results on repeated trials.
– Reliability in the content of Trustworthy Computing is presented by Microsoft as
more than just reliable software and providing support. Microsoft believes it means
being a reliable business partner, maintaining an open dialogue with our customers
and industry partners, and seeking feedback about how we can improve our
software and services.
4. Business Integrity
– Integrity- the quality or state of being complete or undivided
– Business integrity is the essence of a company and its team members.
– Basic integrity principles also displayed in 2004 article from WebProNews states
all the following maybe considered as some of the essentials of building business
integrity.
• A company must display and earn the trust with the client. Trust is assured
reliance on the character, ability, strength, of a business.
• Character feedback and opinions from clients and team members will
display leadership and open up ideas for improvement.
• Evaluate all print materials including advertising, brochures and other
business documents making sure they are clear, precise and professional.
• Remain involved in community related issues and activities. This will
demonstrate that your business is a responsible community contributor.
• Keep a hands-on approach in to accounting and record keeping. Gaining
control of accounting and record keeping allows you to end any dubious
activities promptly.
• Treat all others with the utmost of respect always.
References:
1. https://www.computerhope.com/jargon/c/compcrim.htm
2. https://www.knowledgehut.com/blog/security/types-of-ethical-hacking
3. https://www.trendmicro.com/vinfo/us/security/definition/cybercriminals
4. https://www.giac.org/paper/gsec/4243/pillars-trustworthy-computing-displayed-
patch-management/106837