Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 6 - Computer Crime - Coggle Diagram
Chapter 6 - Computer Crime
Computer Crime
Definition: any crime that involves a computer and a network
Hacking
To gain illegal or unauthorized access to a file, computer, or network
Hacktivism: political hacking
use of hacking to promote a political cause
Disagreement about whether it is a form of civil disobedience and how it should be punished
Example : Prodrug message appeared on US police antidrug website
Identify theft and credit card fraud
Identify theft: various crimes in which a criminal or larga group uses the identify of an unknowing innocent person
use credit/debit card numbers, personal information and social security numbers
Techniques used to steal personal information
Pharming
False web sites for personal and financial information by planting false URLs in domain name servers
Phishing
E-mail fishing for personal and financial information disguised as legitimate business e-mail
Techniques used to protect personal and financial information
Activation for new credit cards
Software detects unusual spending activities and will prompt retailers to ask for identifying information
Responses to identify Theft
authentication of e-mail and web sites
Use of encryption to securely store data, so it is useless if stolen
Scam and forgery
Auctions
Federal trade commission (for customer protection) reports that online auction sites are one of the top sources of fraud complaints
Some sellers do not send items or send inferior products
Click fraud
Repeated clicking on an ad to either increase a site's revenue or to use up a competitor advertising budget
Stock fraud
Most common method is to buy a stock low, send out emails urging others to buy and then sell when the price goes up
Fraud tools for cyber crime
Fraud Analytical tool
Detect fraud tool
Spunk
for e-commerce purpose - protect customers and reputation and avoid fraud
FICO
Fraud management system
Fraud.net Guardian
Identify the right claims to focus on
Automate time-consuming processes
Steamline workflow
Hacking Analytical tool
Sense and detect suspicious/doubtful application which are able to leak private information
Hack Detection Tools
SMS-smishing hacking detector
NetPatrol
The issue of venue
Charges are generally field where the crime occurs
Laws difference between states and countries
Cybercrime Treaty
Purpose: to foster international cooperation among law agencies at different countries to fight cybercrime
Emergence Cyber Law in Malaysia
Telemedicine Act 1997
Computer Crimes Act 1997
Copyright (amendment ) Act 1997
Infromation Technology Act 2000
Digital Signature act 1997
Certified Management Accountant
Policy Objective of CMA
To promote consumer confident in service delivery
To ensure equittable provision of affordable services
To regular for the long term benefit of the end user