Skip to main content

2010 | OriginalPaper | Buchkapitel

9. Computer Crimes

verfasst von : Prof. Joseph Migga Kizza

Erschienen in: Ethical and Social Issues in the Information Age

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

After reading this chapter, the reader should be able to: 1.Describe trends in computer crimes and protection against viruses and denial-of-service attacks. 2.Enumerate techniques to combat “cracker” attacks. 3.Discuss the history of computer crimes. 4.Describe several different cyber-attacker approaches and motivations. 5.Identify the professional’s role in security and the tradeoffs involved. 6. Develop measures to be taken both by individuals themselves and by organizations (including government) to prevent identity theft.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Joseph M. Kizza. Computer Network Security and Cyber Ethics. McFarland, Jefferson, NC, 2001. Joseph M. Kizza. Computer Network Security and Cyber Ethics. McFarland, Jefferson, NC, 2001.
3.
Zurück zum Zitat Karen Forchet. Computer Security Management. Boyd & Fraser, 1994, Danvers, MA. Karen Forchet. Computer Security Management. Boyd & Fraser, 1994, Danvers, MA.
5.
Zurück zum Zitat Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990. Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990.
7.
Zurück zum Zitat Steven Levy. Hackers: Heroes of the Computer Revolution. Anchor Press/Doubleday, Garden City, NY, 1984. Steven Levy. Hackers: Heroes of the Computer Revolution. Anchor Press/Doubleday, Garden City, NY, 1984.
8.
Zurück zum Zitat Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996. Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996.
9.
Zurück zum Zitat John Christensen. “Bracing for Guerilla Warfare in Cyberspace,” CNN Interactive, April 6, 1999. John Christensen. “Bracing for Guerilla Warfare in Cyberspace,” CNN Interactive, April 6, 1999.
14.
Zurück zum Zitat Trigaux, R., “Hidden Dangers,” St. Petersburg Times, June 16, 1998. Trigaux, R., “Hidden Dangers,” St. Petersburg Times, June 16, 1998.
Zurück zum Zitat Anderson, K.E., “Criminal Threats to Business on the Internet: A White Paper,” Global Technology Research, Inc., June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage. Anderson, K.E., “Criminal Threats to Business on the Internet: A White Paper,” Global Technology Research, Inc., June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage.
Zurück zum Zitat Chaturvedi, A., et al., “Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment.” INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry. Chaturvedi, A., et al., “Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment.” INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry.
Zurück zum Zitat Computer Security Institute/Federal Bureau of Investigation, “Annual Cost of Computer Crime Rise Alarmingly: Organizations Report $136 Million in Losses,” Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime. Computer Security Institute/Federal Bureau of Investigation, “Annual Cost of Computer Crime Rise Alarmingly: Organizations Report $136 Million in Losses,” Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime.
Zurück zum Zitat Counterintelligence Office of the Defense Investigative Service, “Industry CI Trends,” OASD-PA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors. Counterintelligence Office of the Defense Investigative Service, “Industry CI Trends,” OASD-PA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors.
Zurück zum Zitat General Accounting Office (GAO), “GAO Executive Report—B-266140,” Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security. General Accounting Office (GAO), “GAO Executive Report—B-266140,” Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security.
Zurück zum Zitat Kapor, M., “Civil Liberties in Cyberspace: When Does Hacking Turn from an Exercise of Civil Liberties into Crime?” Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study. Kapor, M., “Civil Liberties in Cyberspace: When Does Hacking Turn from an Exercise of Civil Liberties into Crime?” Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study.
Zurück zum Zitat National Counterintelligence Center, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage,” Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare. National Counterintelligence Center, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage,” Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare.
Zurück zum Zitat Overill, R.E., “Computer Crime—An Historical Survey,” Defence Systems International, 1998. This paper discusses the historical development of computer crime. Overill, R.E., “Computer Crime—An Historical Survey,” Defence Systems International, 1998. This paper discusses the historical development of computer crime.
Zurück zum Zitat United Nations, “International Review of Criminal Policy—United Nations Manual on the Prevention and Control of Computer-Related Crime,” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime. United Nations, “International Review of Criminal Policy—United Nations Manual on the Prevention and Control of Computer-Related Crime,” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime.
Zurück zum Zitat Andrew Grosso. “The Economic Espionage ACT: Touring the Minefields.” Communications of the ACM, August 2000, 43(8), 15-18.CrossRef Andrew Grosso. “The Economic Espionage ACT: Touring the Minefields.” Communications of the ACM, August 2000, 43(8), 15-18.CrossRef
Zurück zum Zitat Grampp, F. and Morris, R. “Unix Operating System Security” AT&T Bell Laboratories Tech J. 63, 8, Part 2 (October 1984), 1649. Grampp, F. and Morris, R. “Unix Operating System Security” AT&T Bell Laboratories Tech J. 63, 8, Part 2 (October 1984), 1649.
Zurück zum Zitat Peter G. Neumann. “Risks of Insiders.” Communications of the ACM, December 1999, 42(12), p. 160.CrossRef Peter G. Neumann. “Risks of Insiders.” Communications of the ACM, December 1999, 42(12), p. 160.CrossRef
Zurück zum Zitat Joseph M. Kizza. Civilizing the Internet: Global Concerns and Efforts Toward Regulation. McFarland, Jefferson, NC, 1999. Joseph M. Kizza. Civilizing the Internet: Global Concerns and Efforts Toward Regulation. McFarland, Jefferson, NC, 1999.
Metadaten
Titel
Computer Crimes
verfasst von
Prof. Joseph Migga Kizza
Copyright-Jahr
2010
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-84996-038-0_9

Premium Partner