Lecture 2 Computer Crime and Security
Lecture 2 Computer Crime and Security
• Introduction
• Hacking
• Online Scams
• Fraud, Embezzlement, Sabotage, Information Theft, and
Forgery
• Crime Fighting Versus Privacy and Civil Liberties
Computer-related crime
Any illegal act for which knowledge of computer technology is involved for
its investigation, perpetration, or prosecution.
Types of cybercrime
• Internal cybercrimes
• Internet/telecommunications crimes
• Support of criminal enterprises
• Computer-manipulation crimes
• Hardware, software, and information theft
Computer abuse
Any incident associated with computer technology in which a victim
suffered or could have suffered loss and perpetrator intentionally gained
or could have gained.
students groups, (10 pages max. 12 font, times new roman, 1.5
line spacing, sources at the end)
• Phone phreaks
• Used special telecommunications access codes and other
restricted technical information to avoid paying long-
distance charges
• Fraudulent manipulation of telephone signaling in order to make
free phone calls.
• Modern version involves electronic theft of cell phone
numbers and access codes
• Voice mail hacking and voice mail fraud
A Gift of Fire, 2ed Chapter 7: Computer Crime 21
A Profile of Cybercriminals
Cybercriminals tend to come from hacker
subcultures.
• Average hacker
• Male between 16-25 who lives in the US
• Computer user but not programmer
• Hacks with software written by others
• Primary motivation is to gain access to Web sites and
computer networks