Abstract
After reading this chapter, the reader should be able to: 1.Describe trends in computer crimes and protection against viruses and denial-of-service attacks. 2.Enumerate techniques to combat “cracker” attacks. 3.Discuss the history of computer crimes. 4.Describe several different cyber-attacker approaches and motivations. 5.Identify the professional’s role in security and the tradeoffs involved. 6. Develop measures to be taken both by individuals themselves and by organizations (including government) to prevent identity theft.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
“Section A: The Nature and Definition of a Critical Infrastructure.” http://www.nipc.gov/nipcfaq.html
Joseph M. Kizza. Computer Network Security and Cyber Ethics. McFarland, Jefferson, NC, 2001.
Karen Forchet. Computer Security Management. Boyd & Fraser, 1994, Danvers, MA.
Timeline of hacking. http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html
Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. New York: ACM Press, 1990.
Louis J. Freeh. “FBI Congressional Report on Cybercrime.” http://www.fbi.gov/congress00/cyber021600.htm
Steven Levy. Hackers: Heroes of the Computer Revolution. Anchor Press/Doubleday, Garden City, NY, 1984.
Security in Cyberspace: U.S. Senate Permanent Subcommittee on Investigations. June 5, 1996.
John Christensen. “Bracing for Guerilla Warfare in Cyberspace,” CNN Interactive, April 6, 1999.
Carnegie Mellon University. CERT Coordination Center. “CERT/CC Statistics 1998-1999.” http://www.cert.org/stats/cert-stats.html
David S. Alberts. “Information Warfare and Deterrence—Appendix D: Defensive War: Problem Formation and Solution Approach.” http://www.ndu.edu/inns/books/ind/appd.htm
“Hacker Sittings and News: Computer Attacks Spreading (11/19/99).” http://www.infowav.com/hacker/99/hack-11/1999-b.shtml
“Annual Cost of Computer Crime Rise Alarmingly,” Computer Security Institute. http://www.gocsi.com/prela11.html
Trigaux, R., “Hidden Dangers,” St. Petersburg Times, June 16, 1998.
San Diego Police Department. “Tips for Businesses: Computer Crime Prevention.” http://www.sandiego.gov/police/prevention/computer.shtml
Further Readings
Anderson, K.E., “Criminal Threats to Business on the Internet: A White Paper,” Global Technology Research, Inc., June 23, 1997. This is a discussion of the increasing trend of criminal activity against information systems, from the low-level, amateur intruder to organized crime, and industrial and international espionage.
Chaturvedi, A., et al., “Fighting the Wily Hacker: Modeling Information Security Issues for Online Financial Institutions Using the SEAS Environment.” INET JAPAN 2000 Conference, July 18, 2000. The paper discusses proposed methods to analyze the online risks faced by the financial industry.
Computer Security Institute/Federal Bureau of Investigation, “Annual Cost of Computer Crime Rise Alarmingly: Organizations Report $136 Million in Losses,” Press Release, Computer Security Institute, March 4, 1998. This is a summary of the 1998 survey on computer crime.
Counterintelligence Office of the Defense Investigative Service, “Industry CI Trends,” OASD-PA/96-S-1287, December 26, 1996. This paper discusses threats and techniques used for low-level intelligence collecting by foreign companies and governments against U.S. DoD contractors.
General Accounting Office (GAO), “GAO Executive Report—B-266140,” Report to the Committee on Governmental Affairs, U.S. Senate, May 22, 1996. This gives a detailed report on attacks to U.S. Department of Defense computer systems with recommendations for improved security.
Kapor, M., “Civil Liberties in Cyberspace: When Does Hacking Turn from an Exercise of Civil Liberties into Crime?” Scientific American, September 1991. This is a discussion of the various legal, social, and privacy-related issues within computer networks using the U.S. Secret Service’s raid on Steve Jackson Games as a case study.
National Counterintelligence Center, “Annual Report to Congress on Foreign Economic Collection and Industrial Espionage,” Annual Report to the U.S. Congress, 1998. This is a summary of the espionage threat to the United States Specific highlights include the interest in information security and information warfare.
Overill, R.E., “Computer Crime—An Historical Survey,” Defence Systems International, 1998. This paper discusses the historical development of computer crime.
United Nations, “International Review of Criminal Policy—United Nations Manual on the Prevention and Control of Computer-Related Crime,” International Review of Criminal Policy, No. 43 and 44, 1994. These are extensive documents reviewing all aspects of international computer crime.
U.S. Department of Justice. News Release, March 1, 1998. “Israel Citizen Arrested in Israel for Hacking U.S. and Israel Government Computers” http://www.usdoj.gov/opa/pr/1998/march/125.htm.html
“Section A: The Nature and Definition of Critical Infrastructure” http://www.nipc.gov/nipcfaq.htm
Andrew Grosso. “The Economic Espionage ACT: Touring the Minefields.” Communications of the ACM, August 2000, 43(8), 15-18.
Grampp, F. and Morris, R. “Unix Operating System Security” AT&T Bell Laboratories Tech J. 63, 8, Part 2 (October 1984), 1649.
Peter G. Neumann. “Risks of Insiders.” Communications of the ACM, December 1999, 42(12), p. 160.
Joseph M. Kizza. Civilizing the Internet: Global Concerns and Efforts Toward Regulation. McFarland, Jefferson, NC, 1999.
“Computer Attacks: What They Are and How to Defend Against Them,” ITL Bulletins, May 1999. http://www.nist.gov/itl/lab/bulletins/may99.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2010). Computer Crimes. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84996-038-0_9
Download citation
DOI: https://doi.org/10.1007/978-1-84996-038-0_9
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-037-3
Online ISBN: 978-1-84996-038-0
eBook Packages: Computer ScienceComputer Science (R0)