Advertisement

Computer Crimes

  • Joseph Migga Kizza
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

Computer Crimes survey the history and examples of computer crimes, their types, costs to society, and strategies of detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories: penetration and denial-of-service attacks. And these are discussed in depth. Attack motives are also discussed. Are nations, businesses, and individuals prepared for computer attacks? Are they ready to pay the price? We look for answers to these questions as we ponder the costs and consequences of computer crimes. We note also that although it is difficult to estimate the actual costs of e-attacks on physical system resources, progress is being made for better and more accurate estimates. An in-depth discussion of the social and ethical consequences that include psychological effects, moral decay, loss of privacy, and loss of trust follows. We end the chapter with recommendations for educating the computing device users in computer ethics. The need to educate the user to be aware of possible sources of computer crimes and what to do if and when one becomes a victim of these crimes is stressed. It is noted that education can go a long way in reducing computer crimes if the users take crime preventive steps every time they use the computer and computer-related technologies.

References

  1. 1.
    42 U.S. Code § 5195c—Critical infrastructures protection. Legal Information Institute. Cornell Law School. https://www.law.cornell.edu/uscode/text/42/5195c
  2. 2.
    Kizza JM (2011) Computer network security and cyber ethics, 3rd edn. McFarland, Jefferson, NCGoogle Scholar
  3. 3.
    Forchet K (1994) Computer security management. Boyd & Fraser, DanversGoogle Scholar
  4. 4.
    Timeline of computer security hacker history. Wikipedia. https://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
  5. 5.
    Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New YorkGoogle Scholar
  6. 6.
  7. 7.
    Levy S (1984) Hackers: heroes of the computer revolution. Anchor Press/Doubleday, Garden CityGoogle Scholar
  8. 8.
    Security in cyberspace: U.S. senate permanent subcommittee on investigations. June 5, 1996Google Scholar
  9. 9.
    Christensen J (1999) Bracing for guerilla warfare in cyberspace. CNN Interactive, 6 April 1999Google Scholar
  10. 10.
    Carnegie Mellon University, CERT Coordination Center CERT/CC statistics 1998–1999. http://www.cert.org/stats/cert-stats.html
  11. 11.
    Alberts DS Information warfare and deterrence—appendix D: defensive war: problem formation and solution approach. http://www.iwar.org.uk/iwar/resources/deterrence/iwdAppd.htm
  12. 12.
    Insider Threat Surveys, Reports, Incidents, Damages. National Insider Threat Special Interest Group (NITSIG). http://www.nationalinsiderthreatsig.org/nitsig-insiderthreatreportssurveys.html
  13. 13.
  14. 14.
    2010 annual study: U.S. cost of a data breach compliance pressures, cyber attacks targeting sensitive data drive leading IT organizations to respond quickly and pay more. http://www.symantec.com/content/en/us/about/media/pdfs/symantec_ponemon_data_breach_costs_report.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Mar_worldwide_costofdatabreach
  15. 15.

Further Reading

  1. 16.
    Anderson KE Criminal threats to business on the internet: a white paper. Global Technology Research, Inc., 23 June 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionageGoogle Scholar
  2. 17.
    Chaturvedi A et al Fighting the Wily Hacker: modeling information security issues for online financial institutions using the SEAS environment. In: INET JAPAN 2000 Conference, 18 July 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industryGoogle Scholar
  3. 18.
    Computer attacks: what they are and how to defend against them. ITL Bull, May 1999. http://www.nist.gov/itl/lab/bulletins/may99.html
  4. 19.
    Computer Security Institute/Federal Bureau of Investigation. In: Annual cost of computer crime rise alarmingly: organizations report $136 million in losses. Press Release, Computer Security Institute, 4 March 1998. This is a summary of the 1998 survey on computer crimeGoogle Scholar
  5. 20.
    Counterintelligence Office of the Defense Investigative Service. Industry CI Trends. OASDPA/ 96-S-1287, 26 December 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractorsGoogle Scholar
  6. 21.
    General Accounting Office (GAO), “GAO Executive Report—B-266140,” Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved securityGoogle Scholar
  7. 22.
    Grampp F, Morris R Unix operating system security. AT&T Bell Laboratories Tech J 63:8, Part 2 (October 1984), 1649Google Scholar
  8. 23.
    Grosso Andrew (2000) The economic espionage ACT: touring the minefields. Commun ACM 43(8):15–18CrossRefGoogle Scholar
  9. 24.
    Kapor M Civil liberties in cyberspace: when does hacking turn from an exercise of civil liberties into crime? Sci Am, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case studyGoogle Scholar
  10. 25.
    Kizza JM (1999) Civilizing the internet: global concerns and efforts toward regulation. McFarland, Jefferson, NCGoogle Scholar
  11. 26.
  12. 27.
    National Counterintelligence Center. Annual report to congress on foreign economic collection and industrial espionage. In: Annual report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfareGoogle Scholar
  13. 28.
    Neumann Peter G (1999) Risks of insiders. Commun ACM 42(12):160CrossRefGoogle Scholar
  14. 29.
    Overill RE Computer crime—an historical survey. Defence Systems International, 1998. This paper discusses the historical development of computer crime. United Nations, “International Review of Criminal Policy—United Nations Manual on the Prevention and Control of Computer-Related Crime,” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crimeGoogle Scholar
  15. 30.
    San Diego Police Department Tips for businesses: computer crime prevention. https://www.sandiego.gov/police/services/prevention
  16. 31.
    Trigaux R (1998) Hidden dangers. St. Petersburg Times, 16 June 1998Google Scholar
  17. 32.
    U.S. Department of Justice. News Release, March 1, 1998. “Israel Citizen Arrested in Israel for Hacking U.S. and Israel Government Computers” http://www.usdoj.gov/opa/pr/1998/ march/125.htm.html “Section A: The Nature and Definition of Critical Infrastructure” http://www.nipc.gov/nipcfaq.htm

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Engineering and Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations