Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Ethics in Information Technology, Fourth Edition: Computer and Internet Crime
Chapter 3
Computer and Internet Crime
Objectives
• Harmful programs
– Reside in active memory of a computer
– Duplicate themselves
• Can propagate without human intervention
• Negative impact of worm attack
– Lost data and programs
– Lost productivity
– Additional effort for IT workers
• Hackers
– Test limitations of systems out of intellectual curiosity
• Some smart and talented
• termed “lamers” or “script kiddies”
• Crackers
– Cracking is a form of hacking
– Clearly criminal activity
• Smart cards
– Contain a memory chip
– Updated with encrypted data each time card is used
– Used widely in Europe
– Not widely used in the U.S.
• Hacktivism
– Hacking to achieve a political or social goal
• Cyberterrorist
– Attacks computers or networks in an attempt to
intimidate a government in order to advance certain
political or social objectives
– Seeks to cause harm rather than gather information
– Uses techniques that destroy or disrupt services
• Response plan
– Develop well in advance of any incident
– Approved by:
• Legal department
• Senior management
• Primary goals
– Regain control and limit damage
– Not to monitor or catch an intruder
• Review
– Determine exactly what happened
– Evaluate how the organization responded
• Weigh carefully the amount of effort required to
capture the perpetrator
• Consider the potential for negative publicity
• Perpetrators include:
– Hackers
– Crackers
– Malicious insider
– Industrial spies
– Cybercriminals
– Hacktivist
– Cyberterrorists