Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 9 Computer Crime, Candra Putra Nuswantoro 041711333124 - Coggle…
Chapter 9 Computer Crime
History and Evolution of Computers Crimes
Stanford Research International
Vandalism
Information or Property Theft
Financial Fraud or Theft
Unauthorized use or sale of (computer) services
Equity Funding Scandal
Recent Statistics on Computer Crime
Statistics in computer crime are difficult to accumulate and assess. For starters, many crimes go unreported. The 2005 Federal Bureau of Investigation (FBI) Computer Crime Survey indicated that while 90 percent of surveyed participants reported security incidents, only 9 percent reported the incident to law enforcement
Computer Crime Theories and Categorizations
Computer Crime Theory: MOMM
MOMM is an acronym for motivations, opportunities, means, and methods. Notice the first two terms come from the fraud triangle (omitting only the rationalization leg). Means are closely related to opportunities and internal controls, with the addition of technology.
Computer Crime Categorizations
The computer could be the target of the offender (destroying computers, denial of service, etc.), instrument used to commit the crime (online identity theft, fraudulent second set of accounting records, etc.), or incidental to the crime.
Characteristics of the Computer Environment
Connectivity
Concentration of Data
Positions of Trusts
Information Security (INFOSEC)
Risks and Threats
Management needs to establish fundamental security objectives tied to business objectives and identify assets that need protection from identified risks. A good policy is contingent on a proper and thorough risk assessment.
Profiling Internet Fraudsters
Types of Computer Crimes
Identity Theft
Blackmail
Denial of Service Attack
E-mail Attacks
Criminal Intent
InfoSec Controls and Activities
Candra Putra Nuswantoro
041711333124