Term
Many computer crimes go unreported |
|
Definition
Because it is difficult to estimate |
|
|
Term
|
Definition
-Crimes against the computer -Crimes using a computer |
|
|
Term
|
Definition
Hogging system resources to point of degraded service |
|
|
Term
|
Definition
Unauthorized penetrations |
|
|
Term
|
Definition
Interception of computer terminal images through use of Radio Frequency (RF) Signals. U.S. Government developed Tempest to defeat this by shielding RF. |
|
|
Term
|
Definition
Using social skills to gain information |
|
|
Term
|
Definition
Using computer to perpetuate crimes, i.e. auctions of non-existent merchandise |
|
|
Term
|
Definition
|
|
Term
|
Definition
Going through garbage to find paper trails |
|
|
Term
|
Definition
Viruses and Trojan Horses |
|
|
Term
|
Definition
Inserting false IP to disguise original location |
|
|
Term
|
Definition
Pretending to be someone else |
|
|
Term
|
Definition
Illegally acquiring funds |
|
|
Term
|
Definition
|
|
Term
|
Definition
Violates government laws for the protection of the people. Financial penalties and imprisonment |
|
|
Term
|
Definition
Wrong inflicted upon an individual or organization results in damage or loss, no prison |
|
|
Term
|
Definition
Standards of performance and conduct, financial penalties and imprisonment |
|
|
Term
|
Definition
Provides owner legally enforceable right to exclude others for specified time (U.S. 17 years) |
|
|
Term
|
Definition
Protects original works of authorship, can be used for software and databases |
|
|
Term
|
Definition
Secures confidentiality of proprietary technical and business related information |
|
|
Term
|
Definition
Establishes word, name, symbol, color or sounds used to identify and distinguish goods |
|
|
Term
US Computer Fraud and Abuse Act |
|
Definition
Addresses fraud using government omputers can be found at 18 U.S.C. § 1030 (1986) |
|
|
Term
Title 18 of the 1992 Edition of the U.S.C. |
|
Definition
Contains Crimes and Criminal Procedures. Many computer crimes are prosecuted under this title. |
|
|
Term
|
Definition
Keystroke monitoring, e-mail monitoring, surveillance cameras, badges and magnetic card keys all allow monitoring of individuals. |
|
|
Term
|
Definition
-Inform users that all e-mail is being monitored by displaying log-on banner -Banner should state: logging on to system consents user to being monitored. Unauthorized access is prohibited. Subject to prosecution. -Ensure monitoring is uniformly applied -Explain acceptable use -Explain who can read e-mail and how long it is backed up -No guarantee of privacy |
|
|
Term
|
Definition
Occurs after individual has gained unlawful access to a system, then lured to an attractive area “honey pot” in order to provide time to identify the individual |
|
|
Term
|
Definition
Encourages the commitment of a crime that the individual had no intention of committing |
|
|
Term
|
Definition
Collecting information from and about computer systems that is admissible in a court of law. |
|
|
Term
Chain of Command components |
|
Definition
-Location of evidence -Time evidence obtained -Identification of individual who discovered evidence -Identification of individual who obtained evidence -Identification of individual who controlled/maintained possession of evidence |
|
|
Term
|
Definition
-Discovery and recognition -Protection -Recording -Collection -Identification (tagging and marking) -Preservation -Transportation -Presentation in court -Return to evidence owner |
|
|
Term
|
Definition
Must be related to the crime, shows crime has been committed |
|
|
Term
|
Definition
Obtained in lawful manner |
|
|
Term
|
Definition
Not been tampered or modified |
|
|
Term
|
Definition
Identified without changing or damaging evidence |
|
|
Term
|
Definition
Not subject to damage or destruction |
|
|
Term
|
Definition
Original or primary evidence rather than a copy |
|
|
Term
|
Definition
A copy of evidence, or description of contents |
|
|
Term
|
Definition
Proves or disproves a specific act based on witness testimony using five senses |
|
|
Term
|
Definition
Incontrovertible, overrides all evidence |
|
|
Term
|
Definition
May offer opinion based on expertise and facts |
|
|
Term
|
Definition
May testify only to the facts |
|
|
Term
|
Definition
Inference on other information |
|
|
Term
|
Definition
Not based on first hand knowledge, not admissible in court, often computer generated reports fall under this rule. |
|
|
Term
Corporate investigation should include |
|
Definition
-Management -Corporate security -Human Resources -Legal department -other appropriate staff |
|
|
Term
|
Definition
|
|
Term
1991 US Federal Sentencing Guidelines |
|
Definition
-Unauthorized possession without the intent to profit is a crime -Address both individuals and organizations -Degree of punishment corresponds to level of due diligence -Invoke “prudent man” rule due care of Senior Officials – Civil Law -Place responsibility on Senior Management for prevention and detection programs up to $290 Million |
|
|
Term
|
Definition
Means to prevent computer resources from being used as a source of attack on another organization |
|
|
Term
|
Definition
Steps that are taken to show that a company has taken responsibility for the activities that take place within the corporation and have taken the necessary steps to help protect the company, its resources and employees. |
|
|
Term
|
Definition
Continual activities that make sure the protection mechanisms are continually maintained and operational. |
|
|
Term
|
Definition
To perform duties that prudent people would exercise in similar circumstances. |
|
|
Term
|
Definition
Certified professionals are morally and legally held to a higher standard. Should be included in organizational computing policy |
|
|
Term
|
Definition
1.Conduct themselves with highest standards of ethical, moral and legal behavior 2.Not commit any unlawful or unethical act that may impact the reputation of the profession 3.Appropriately report unlawful behavior 4.Support efforts to promote prudent information security measures 5.Provide competent service to their employers and clients; avoid conflicts of interest 6.Execute responsibilities with highest standards 7.Not misuse information in which they come into contact with during their duties |
|
|
Term
Computer Ethics Institute Top Ten |
|
Definition
1.Not use a computer to harm others 2.Interfere with other’s computer work 3.Snoop around other files 4.Use a computer to steal 5.Use a computer to bear false witness 6.Not copy or use proprietary software 7.Not use others computer without permission 8.Not appropriate others intellectual output 9.Think about social consequences of the programs you write 10.Ensure considerations and respect for others |
|
|
Term
Internet Activities Board (IAB) Unacceptable actions |
|
Definition
-Seeks to gain unauthorized access to resources of the Internet -Disrupts intended use of the internet -Wastes resources -Compromises privacy of others -Involves negligence in conduct of Internet Experiments |
|
|
Term
|
Definition
A device that simulates a tone that tricks the telephone company’s system into thinking the user is authorized for long distance service, which enables him to make the call. |
|
|
Term
|
Definition
Simulates the sound of coins being dropped into a payphone |
|
|
Term
|
Definition
Manipulates the line voltage to receive a toll-free call. |
|
|
Term
1996 National Information Infrastructure Protection Act |
|
Definition
Amended the computer fraud and abuse act patterned after the OECD. |
|
|
Term
GAASSP – Generally Accepted Systems Security Principles |
|
Definition
-Computer security supports the business mission -Computer security is integral to sound management -Computer security should be cost effective -System Owners have responsibility outside of their organization -Computer security requires a comprehensive integrated approach -Computer security should be periodically reassessed -Computer security is constrained by societal factors |
|
|
Term
n 1996 U.S. Kennedy-Kassenbaum Health Insurance portability and Accountability Act. |
|
Definition
|
|
Term
n 1996 – US Economic and Protection of Proprietary Information Act |
|
Definition
Industrial and corporate espionage |
|
|
Term
1995 Council Directive Law on Data Protection for the European Union |
|
Definition
Declares EU is similar to OECD |
|
|
Term
1994 - Computer Abuse Amendments Act |
|
Definition
-Changed federal interest computer to a computer used in interstate commerce or communications -Covers viruses and worms -Includes intentional damage as well as reckless disregard -Limited imprisonment for unintentional damage to one year -Provides civil action for compensatory damages |
|
|
Term
1992 OECD – Guidelines to serve as Total Security Framework |
|
Definition
Laws, policies, procedures, training |
|
|
Term
1991 US Federal Sentencing Guidelines |
|
Definition
-Unauthorized possession without the intent to profit is a crime -Address both individuals and organizations -Degree of punishment corresponds to level of due diligence -Invoke “prudent man” rule due care of Senior Officials – Civil Law -Place responsibility on Senior Management for prevention and detection programs up to $290 Million - Civil Law |
|
|
Term
1990 United Kingdom Misuse Act |
|
Definition
defines computer related crimes |
|
|
Term
1987 – Computer Security Act |
|
Definition
Requires federal government to: -Provide security-related training -Identify sensitive systems -Develop security plan for sensitive systems -Developed Sensitive But Unclassified (SBU) designation -Split responsibility between National Institute of Standards and Technology (NIST) and National Security Agency (NSA) *NIST – commercial and SBU *NSA – cryptography and classified government and military applications |
|
|
Term
1986 Electronic Communications Privacy Act |
|
Definition
|
|
Term
1986 (Amended 1996) – US Computer Fraud and Abuse Act |
|
Definition
Clarified 1984 law, Added three laws: -use of federal interest computer to further intended fraud -altering or destroying information on federal interest computer that causes $1,000 in loss or medical treatment -Trafficking in computer passwords if it affects commerce or allows access to government computers |
|
|
Term
1984 – US Medical Computer Crime Act |
|
Definition
Illegal alteration of computerized medical records |
|
|
Term
1980 Organization for Economic Cooperation and Development (OECD) |
|
Definition
Data collection limitations |
|
|
Term
|
Definition
Applies to federal agencies |
|
|
Term
1973 – US Code of Fair Information Practices |
|
Definition
|
|
Term
1970 - US Racketeer Influenced and Corrupt Organization Ace |
|
Definition
Racketeers influencing business |
|
|
Term
1970 – US Fair Credit Reporting Act |
|
Definition
Consumer reporting agencies |
|
|